Skip to main content

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3969))

Abstract

In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first define a new “metric” (with slightly different properties than the standard Hamming metric). Using this metric we define a very particular class of codes that we call error-set correcting codes, based on a set of forbidden distances which is a monotone decreasing set. Next we redefine the packing problem for the new settings and generalize the notion of error-correcting capability of the error-set correcting codes accordingly (taking into account the new metric and the new packing). Then we consider burst-error interleaving codes proposing an efficient burst-error correcting technique, which is in fact the well known VSS and Distributed Commitments (DC) pair-wise checking protocol and we prove the error-correcting capability of the error-set correcting interleaving codes.

Using the known relationship, due to Van Dijk, between a Monotone Span Program (MSP) and a generator matrix of the code generated by the suitable set of vectors, we prove that the error-set correcting codes in fact has the allowed (opposite to forbidden) distances of the dual access structure of the access structure that the MSP computes. We give an efficient construction for them based on this relation and as a consequence we establish a link between Secret Sharing Schemes (SSS) and the error-set correcting codes.

Further we give a necessary and sufficient condition for the existence of linear SSS (LSSS), to be secure against (Δ,Δ A )-adversary expressed in terms of an error-set correcting code. Finally, we present necessary and sufficient conditions for the existence of a VSS scheme, based on an error-set correcting code, secure against (Δ,Δ A )-adversary.

Our approach is general and covers all known linear VSS/DC. It allows us to establish the minimal conditions for security of VSSs. Our main theorem states that the security of a scheme is equivalent to a pure geometrical (coding) condition on the linear mappings describing the scheme. Hence the security of all known schemes, e.g. all known bounds for existence of unconditionally secure VSS/DC including the recent result of Fehr and Maurer, can be expressed as certain (geometrical) coding conditions.

The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT, and by Concerted Research Action GOA Ambiorix 2005/11 of the Flemish Government.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In: STOC 1988, pp. 1–10 (1988)

    Google Scholar 

  2. Blakley, G., Kabatianskii, G.: Linear Algebra Aproach to Secret Sharing Schemes. In: Chmora, A., Wicker, S.B. (eds.) Information Protection 1993. LNCS, vol. 829, pp. 33–40. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  3. Brickell, E.: Some ideal secret sharing schemes. J. of Comb. Math. and Comb. Computing 9, 105–113 (1989)

    MathSciNet  MATH  Google Scholar 

  4. Chaum, D., Crepeau, C., Damgard, I.: Multi-Party Unconditionally Secure Protokols. In: STOC 1988, pp. 11–19 (1988)

    Google Scholar 

  5. Cramer, R., Damgård, I.B., Maurer, U.M.: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316–334. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Elsevier Science, Amsterdam (1997)

    MATH  Google Scholar 

  7. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: FOCS 1985, pp. 383–395 (1985)

    Google Scholar 

  8. van Dijk, M.: Secret Key Sharing and Secret Key Generation, Ph.D. Thesis, TU Eindhoven (1997)

    Google Scholar 

  9. Delsarte, P.: The Hamming space viewed as an association scheme. In: 23rd Symp. on Inform. Theory in the Benelux, pp. 329–380 (2002)

    Google Scholar 

  10. Fehr, S., Maurer, U.M.: Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 565–580. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Fitzi, M., Hirt, M., Maurer, U.M.: Trading Correctness for Privacy in Unconditional Multi-party Computation. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 121–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Hirt, M., Maurer, U.: Player Simulation and General Adversary Structures in Perfect Multiparty Computation. J. of Cryptology 13, 31–60 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  13. Karchmer, M., Wigderson, A.: On Span Programs. In: 8th Annual Struct. in Compl., Theory Conf., pp. 102–111 (1993)

    Google Scholar 

  14. Massey, J.: Minimal codewords and secret sharing. In: 6th Joint Swedish-Russian Int. Workshop on Inform. Theory, pp. 276–279 (1993)

    Google Scholar 

  15. McEliece, R., Sarwate, D.: On Sharing secrets and Reed-Solomon codes. Commun. ACM 24, 583–584 (1981)

    Article  MathSciNet  Google Scholar 

  16. Mac Williams, F., Sloane, N.: The Theory of Error-Correcting Codes. Elsevier Science, Amsterdam (1988)

    Google Scholar 

  17. Nikov, V., Nikova, S., Preneel, B., Vandewalle, J.: Applying General Access Structure to Proactive Secret Sharing Schemes. In: 23rd Symp. on Inform. Theory in the Benelux, pp. 197–206 (2002); Cryptology ePrint Archive: Report 2002/141

    Google Scholar 

  18. Nikov, V., Nikova, S., Preneel, B.: On Multiplicative Linear Secret Sharing Schemes. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 135–147. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Nikov, V., Nikova, S., Preneel, B.: On the Size of Monotone Span Programs. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 249–262. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nikov, V., Nikova, S. (2006). On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes. In: Ytrehus, Ø. (eds) Coding and Cryptography. WCC 2005. Lecture Notes in Computer Science, vol 3969. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11779360_22

Download citation

  • DOI: https://doi.org/10.1007/11779360_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35481-9

  • Online ISBN: 978-3-540-35482-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics