Abstract
Let ℱ n be a monotone, nontrivial family of sets over {1, 2, …,n}. An ℱ n perfect secret-sharing scheme is a probabilistic mapping of a secret ton shares, such that:
-
•
The secret can be reconstructed from any setT of shares such thatT ∈ ℱ n .
-
•
No subsetT ∉ ℱ n of shares reveals any partial information about the secret.
Various secret-sharing schemes have been proposed, and applications in diverse contexts were found. In all these cases the set of secrets and the set of shares are finite.
In this paper we study the possibility of secret-sharing schemes overinfinite domains. The major case of interest is when the secrets and the shares are taken from acountable set, for example all binary strings. We show that no ℱ n secret-sharing scheme over any countable domain exists (for anyn ≥ 2).
One consequence of this impossibility result is that noperfect private-key encryption schemes, over the set of all strings, exist. Stated informally, this means that there is no way to encrypt all strings perfectly without revealing information about their length. These impossibility results are stated and proved not only for perfect secret-sharing and private-key encryption schemes, but also for wider classes—weak secret-sharing and private-key encryption schemes.
We constrast these results with the case where both the secrets and the shares are real numbers. Simple perfect secret-sharing schemes (and perfect private-key encryption schemes) are presented. Thus, infinity alone does not rule out the possibility of secret sharing.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Abadi, M., J. Feigenbaum, and J. Kilian, On Hiding Information from an Oracle,J. Comput. System Sci., Vol. 39, No. 1, pp. 21–50, 1989.
Ben-David, S., Private communication.
Ben-or, M., S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation,Proc. 20th Symp. on Theory of Computing, pp. 1–10, 1988.
Benaloh (Cohen), J. D., Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret,Advances in Cryptography—Crypto 86 (Proceedings), A. M. Odlyzko (ed.), pp. 251–260, Lecture Notes in Computer Science, Vol. 263, Springer-Verlag, Berlin, 1987.
Benaloh, J., and J. Leichter, Generalized Secret Sharing and Monotone Functions,Advances in Cryptography—Crypto 86 (Proceedings), A. M. Odlyzko (ed.), pp. 213–222, Lecture Notes in Computer Science, Vol. 263, Springer-Verlag, Berlin, 1987.
P. Billingsley,Probability and Measure, Wiley, New York, 1979.
Blakley, G. R., Safeguarding Cryptographic Keys,Proc. NCC AFIPS 1979, pp. 313–317, 1979.
Blakley, G. R., and L. Swanson, Security Proofs for Information Protection Systems,Proc. IEEE Symp. on Security and Privacy, 1981, pp. 75–88.
Blakley, G. R., and L. Swanson, Infinite Structures in Information Theory,Proc. Crypto 82, pp. 39–50.
Goldreich, O., S. Micali, and A. Wigderson, How To Play Any Mental Game,Proc 19th Symp. on Theory of Computing, pp. 218–229, 1987.
Ito, M., A. Saito, and T. Nishizeki. Secret Sharing Schemes Realizing General Access Structure,Proc. IEEE Global Telecommunication Conf., Globecom 87, pp. 99–102, 1987.
Kothari, S. C., Generalized Linear Threshold Scheme,Advances in Cryptography—Crypto 84 (Proceedings), G. R. Blakey and D. Chaum (ed.), pp. 231–241, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, Berlin, 1985.
Rabin, M. O., Randomized Byzantine Generals,Proc. 24th Symp. on Foundations of Computer Science, pp. 403–409, 1983.
Shamir, A., How To Share a Secret,Comm. ACM, Vol. 22, 1979, pp. 612–613.
Shannon, C. E., Communication Theory of Secrecy Systems,Bell System Tech. J., Vol. 28, 1949, pp. 657–715.
Stinson, D. R., and S. A. Vanstone, A Combinatorial Approach to Threshold Schemes,SIAM J. Discrete Math., Vol. 1, 1988, pp. 230–236.
Author information
Authors and Affiliations
Additional information
Communicated by Ernest F. Brickell
This research was supported by Technion V.P.R. Fund 120–722, New York Metropolitan research fund, and by US-Israel BSF Grant 88-00282. An early version of this paper appeared inAdvances in Cryptology, Proceedings of Crypto ’89, G. Brassard, ed., pp. 299–306, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, Berlin, 1990.
Rights and permissions
About this article
Cite this article
Chor, B., Kushilevitz, E. Secret sharing over infinite domains. J. Cryptology 6, 87–95 (1993). https://doi.org/10.1007/BF02620136
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02620136