Abstract
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) defined over a finite field \({\mathbb F}_q\), with the following properties.
1. It is ideal. The number of players n can be as large as \(\#C({\mathbb F}_q)\), where C is an algebraic curve C of genus g defined over \({\mathbb F}_q\).
2. It is quasi-threshold: it is t-rejecting and t+1+2g-accepting, but not necessarily t+1-accepting. It is thus in particular a ramp scheme. High information rate can be achieved.
3. It has strong multiplication with respect to the t-threshold adversary structure, if \(t<\frac{1}{3}n-\frac{4}{3}g\). This is a multi-linear algebraic property on an LSSS facilitating zero-error multi-party multiplication, unconditionally secure against corruption by an active t-adversary.
4. The finite field \({\mathbb F}_q\) can be dramatically smaller than n. This is by using algebraic curves with many \({\mathbb F}_q\)-rational points. For example, for each small enough ε, there is a finite field \({\mathbb F}_q\) such that for infinitely many n there is an LSSS over \({\mathbb F}_q\) with strong multiplication satisfying \((\frac{1}{3}- \epsilon) n\leq t < \frac{1}{3}n\).
5. Shamir’s scheme, which requires n>q and which has strong multiplication for \(t<\frac{1}{3}n\), is a special case by taking g=0.
Now consider the classical (“BGW”) scenario of MPC unconditionally secure (with zero error probability) against an active t-adversary with \(t<\frac{1}{3}n\), in a synchronous n-player network with secure channels. By known results it now follows that there exist MPC protocols in this scenario, achieving the same communication complexities in terms of the number of field elements exchanged in the network compared with known Shamir-based solutions. However, in return for decreasing corruption tolerance by a small ε-fraction, q may be dramatically smaller than n. This tolerance decrease is unavoidable due to properties of MDS codes. The techniques extend to other models of MPC. Results on less specialized LSSS can be obtained from more general coding theory arguments.
The authors independently submitted similar results to CRYPTO 2006 [5,8]. This paper is the result of merging those two papers.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of STOC 1988, pp. 1–10. ACM Press, New York (1988)
Bierbrauer, J.: Universal Hashing and Geometric Codes. Designs, Codes and Cryptography 11, 207–221 (1997)
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of National Computer Conference 1979. AFIPS Proceedings, vol. 48, pp. 313–317 (1979)
Chaum, D., Crépeau, C., Damgaard, I.: Multi-party unconditionally secure protocols. In: Proceedings STOC 1988, pp. 11–19. ACM Press, New York (1988)
Chen, H.: Linear secret sharing from algebraic-geometric codes. Merged with [8]
Chen, H., Cramer, R., Ding, C., Xing, C.: Secret sharing and secure multi-party compuation from projective algebraic subsets. Work in progress
Chen, H., Cramer, R., Goldwasser, S., Vaikuntanathan, V., de Haan, R.: Threshold MPC in the Rabin-Ben Or broadcast model unconditionally secure against corrupt minorities based on general error correcting codes. Work in progress
Cramer, R.: Algebraic geometric secret sharing and secure computation over small fields. Merged with [5]
Cramer, R., Fehr, S., Stam, M.: Black-box secret sharing from primitive sets in algebraic number fields. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 344–360. Springer, Heidelberg (2005)
Cramer, R., Daza, V., Gracia, I., Urroz, J.J., Leander, G., Martí-Farré, J., Padró, C.: On codes, matroids and secure multi-party computation from linear secret sharing schemes. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 327–343. Springer, Heidelberg (2005)
Cramer, R., de Haan, R.: Atomic Secure Multi-Party Multiplication with Low Communication (manuscript, 2004)
Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 596–613. Springer, Heidelberg (2003)
Cramer, R., Fehr, S.: Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 272–287. Springer, Heidelberg (2002)
Cramer, R., Damgaard, I., Dziembowski, S.: On the complexity of verifiable secret sharing and multi-party computation. In: Proceedings of STOC 2000, pp. 325–334. ACM Press, New York (2000)
Cramer, R., Damgård, I.B., Maurer, U.M.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316–334. Springer, Heidelberg (2000)
Cramer, R., Damgård, I.B., Dziembowski, S., Hirt, M., Rabin, T.: Efficient multiparty computations secure against an adaptive adversary. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 311. Springer, Heidelberg (1999)
Desmedt, Y., Frankel, Y.: Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM Journal of Discrete Mathematics 7, 667–679 (1994)
McEliece, R.J., Sarvate, D.V.: On sharing secrets and Reed-Solomon codes. Comm. of the ACM 22(11), 612–613 (1979)
Franklin, M., Yung, M.: Communication complexity of secure computation. In: Proceedings of STOC 1992. ACM Press, New York (1992)
Fulton, W.: Algebraic Curves. Advanced Book Classics. Addission-Wesley
García, A., Stichtenoth, H.: On the asymptotic behavior of some towers of function fields over finite fields. J. Number Theory 61, 248–273 (1996)
van der Geer, G., van der Vlugt, M.: Tables of curves with many points. Mathematics of Computation 69, 797–810 (2000), See also, www.science.uva.nl/~geer
Goppa, V.D.: Codes on algebraic curves. Soviet Math. Dokl. 24, 170–172 (1981)
Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the Eigth Annual Structure in Complexity Theory Conference, pp. 102–111. IEEE, Los Alamitos (1993)
Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 609–623. Springer, Heidelberg (1999)
Lam, K.Y., Wang, H.X., Xing, C.: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions in Information Theory 46, 886–892 (2000)
Lang, S.: Algebra. Addison-Wesley, Reading (1997)
van Lint, J.H.: Introduction to Coding Theory. GTM. Springer, Heidelberg
Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6-th Joint Swedish-Russian Workshop on Information Theory, Molle, Sweden, August 1993, pp. 269–279 (1993)
Massey, J.L.: Some applications of coding theory in cryptography. In: Codes and Ciphers: Cryptography and Coding IV, pp. 33–47 (1995)
Niederreiter, H., Wang, H., Xing, C.: Function fields over finite fields and their application to cryptography. In: García, A., Stichtenoth, H. (eds.) Topics in geometry, coding theory and cryptography. Springer, Heidelberg (2006)
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. ACM STOC 1989, pp. 73–85 (1989)
Shamir, A.: How to share a secret. Comm. of the ACM 22(11), 612–613 (1979)
Silverman, J.: The Arithmetic of Elliptic Curves. GTM. Springer, Heidelberg
Shum, K.W., Aleshnikov, I., Kumar, V.P., Stichtenoth, H., Deolaikar, V.: A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound. IEEE Trans. IT 47(6), 2225–2241 (2001)
Stichtenoth, H.: Algebraic function fields and codes. Springer, Heidelberg (1993)
Tsfasman, M., Vladuts, S.: Algebraic-geometric codes. Kluwer Academic Publishers, Dordrecht (1991)
Vladuts, S.: A note on authentication codes from algebraic geometry. IEEE Transactions in Information Theory 44(3), 1342–1345 (1998)
Xing, C.: Authentication codes and algebraic curves. In: Proceedings of the 3rd European Congress of Mathematics, Bikhauser, vol. 2, pp. 239–244 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, H., Cramer, R. (2006). Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. In: Dwork, C. (eds) Advances in Cryptology - CRYPTO 2006. CRYPTO 2006. Lecture Notes in Computer Science, vol 4117. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11818175_31
Download citation
DOI: https://doi.org/10.1007/11818175_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37432-9
Online ISBN: 978-3-540-37433-6
eBook Packages: Computer ScienceComputer Science (R0)