Skip to main content

Advertisement

Log in

Improved Universal Thresholdizer from Iterative Shamir Secret Sharing

  • Research Article
  • Published:
Journal of Cryptology Aims and scope Submit manuscript

Abstract

The universal thresholdizer, introduced at CRYPTO’18, is a cryptographic scheme that transforms any cryptosystem into a threshold variant, thereby enhancing its applicability in threshold cryptography. It enables black-box construction of one-round threshold signature schemes based on the Learning with Errors problem, and similarly, facilitates one-round threshold ciphertext-attack secure public-key encryption when integrated with non-threshold schemes. Current constructions of universal thresholdizer are fundamentally built upon linear secret sharing schemes. One approach employs Shamir secret sharing, which lacks compactness and results in ciphertext sizes of \(O(N \log N)\), where N is the number of parties involved in the threshold system, and another approach uses the \(\{0,1\}\)-linear secret sharing scheme (\(\{0,1\}\)-LSSS), which is compact but induces high communication costs due to requiring \(O(N^{5.3})\) secret shares. In this work, we introduce a communication-efficient universal thresholdizer by revising the linear secret sharing scheme. We propose a specialized linear secret sharing scheme, called TreeSSS, which reduces the number of required secret shares to \(O(N^{3+o(1)})\) while maintaining the compactness of the universal thresholdizer. TreeSSS can also serve as a subroutine for constructing lattice-based t-out-of-N threshold cryptographic primitives such as threshold fully homomorphic encryptions and threshold signatures. In this context, TreeSSS offers the advantage of lower communication overhead due to the reduced number of secret shares involved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3

Notes

  1. To put it simply, the property of compactness is maintained when the magnitude of q is bounded by a polynomial function of N.

  2. [14, 40] propose the definition of \(\{ {0,1} \}\)-LSSS for arbitrary access structure, but they only instantiated \(\{ {0,1} \}\)-LSSS for t-out-of-N.

  3. \(\textsf {nTFHE.Eval}(C_\textsf {ct}, \{ {{\textsf {nct}}_{\textsf {i}}} \})\) can be regarded as bootstrapping step of \({\textsf {nTFHE}}\).

  4. In this case, we define a particular partition that may not appear to be randomly distributed. However, if we repeat the process of secret key distribution in sufficient detail, [53] assures us that a linear secret sharing scheme can be successfully constructed for a threshold structure, provided that secret shares are distributed randomly among the parties.

  5. The method for distributing level-L secret shares is exactly the same as \(\{ {0,1} \}\)-LSSS. Informally, the distributor randomly partitions the set \({1,\ldots ,(2s-1)^L}\) into N subsets, and sends the level-L secret shares corresponding to the indices within these N subsets to each respective party. We leave the detailed method in Sect. 4.2.

  6. To prevent information leakage, the large error should be added. However, we omit the error for simplicity.

  7. The detailed computation of approximations will be given by Appendix A.

  8. The proof is exactly the same as that of Proposition 4.5 except for using \(\textbf{D}\) rather than \(\textbf{V}_s\).

References

  1. S. Agrawal, X. Boyen, V. Vaikuntanathan, P. Voulgaris, H. Wee, Functional encryption for threshold functions (or fuzzy ibe) from lattices, in Public Key Cryptography—PKC 2012. ed. by M. Fischlin, J. Buchmann, M. Manulis (Springer, Berlin, 2012), pp. 280–297

  2. S. Agrawal, D. Stehlé, A. Yadav, Round-optimal lattice-based threshold signatures, revisited, in 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022) (Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2022)

  3. B. Applebaum, O. Nir, B. Pinkas, How to recover a secret with o(n) additions, in Advances in Cryptology—CRYPTO 2023. ed. by H. Handschuh, A. Lysyanskaya (Springer, Cham, 2023), pp. 236–262

  4. G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan, D. Wichs, Multiparty computation with low communication, computation and interaction via threshold fhe, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2012), pp. 483–501

  5. S. Badrinarayanan, A. Jain, N. Manohar, A. Sahai, Secure mpc: laziness leads to god, in Advances in Cryptology—ASIACRYPT 2020. ed. by S. Moriai, H. Wang (Springer, Cham, 2020), pp. 120–150

  6. M. Ball, A. Çakan, T. Malkin, Linear threshold secret-sharing with binary reconstruction, in 2nd Conference on Information-Theoretic Cryptography (ITC 2021), volume 199 of Leibniz International Proceedings in Informatics (LIPIcs). ed. by S. Tessaro (Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2021), pp. 11–1222

  7. R. Bendlin, I. Damgård, Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems, in Theory of Cryptography Conference (Springer, 2010), pp. 201–218

  8. F. Benhamouda, S. Halevi, L. Stambler, Weighted secret sharing from wiretap channels, in 4th Conference on Information-Theoretic Cryptography (ITC 2023), volume 267 of Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, ed. by K.-M. Chung (Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2023), pp. 81–819

  9. N. Bitansky, Verifiable random functions from non-interactive witness-indistinguishable proofs. J. Cryptol. 33(2), 459–493 (2020)

  10. G.R. Blakley 1985 Catherine Meadows, Security of ramp schemes. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology (Springer, Berlin), pp. 242–268

  11. M. Blum, Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News. 15(1), 23–27 (1983)

  12. A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme, in International Workshop on Public Key Cryptography (Springer, 2003), pp. 31–46

  13. D. Boneh, R. Gennaro, S. Goldfeder, Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security, in International Conference on Cryptology and Information Security in Latin America (Springer, 2017), pp. 352–377

  14. D. Boneh, R. Gennaro, S. Goldfeder, A. Jain, S. Kim, P.M.R. Rasmussen, A. Sahai, Threshold cryptosystems from threshold fully homomorphic encryption, in Annual International Cryptology Conference (Springer, 2018), pp. 565–596

  15. J.-P. Bossuat, R. Cammarota, J.H. Cheon, I. Chillotti, B.R. Curtis, W. Dai, H. Gong, E. Hales, D. Kim, B. Kumara et al., Security guidelines for implementing homomorphic encryption. Cryptology ePrint Archive (2024)

  16. K. Boudgoust, P. Scholl, Simple threshold (fully homomorphic) encryption from lwe with polynomial modulus, in Advances in Cryptology—ASIACRYPT 2023. ed. by J. Guo, R. Steinfeld (Springer, Singapore, 2023), pp. 371–404

  17. Z. Brakerski, Fully homomorphic encryption without modulus switching from classical gapsvp, in Advances in Cryptology—CRYPTO 2012 (Springer, Berlin, 2012), pp. 868–886

  18. Z. Brakerski, C. Gentry, V. Vaikuntanathan, (leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 1–36 (2014)

  19. Z. Brakerski, R. Perlman, Lattice-based fully dynamic multi-key fhe with short ciphertexts, in Annual Cryptology Conference (Springer, 2016), pp. 190–213

  20. R. Canetti, R. Gennaro, S. Goldfeder, N. Makriyannis, U. Peled, Uc non-interactive, proactive, threshold ECDSA with identifiable aborts, in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 1769–1787

  21. J.H. Cheon, A. Kim, M. Kim, Y. Song, Homomorphic encryption for arithmetic of approximate numbers, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, New York, 2017), pp. 409–437

  22. J H. Cheon, D. Kim, D. Kim, Efficient homomorphic comparison methods with optimal complexity, in Advances in Cryptology–ASIACRYPT 2020, ed. by S. Moriai, H. Wang (Springer, Cham, 2020), pp. 221–256

  23. I. Chillotti, N. Gama, M. Georgieva, M. Izabachene, Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds, in international Conference on the Theory and Application of Cryptology and Information Security (Springer, 2016), pp. 3–33

  24. S. Chowdhury, S. Sinha, A. Singh, S. Mishra, C. Chaudhary, S. Patranabis, P. Mukherjee, A. Chatterjee, D. Mukhopadhyay, Efficient fhe with threshold decryption and application to real-time systems. Cryptology ePrint Archive (2022)

  25. I. Damgård, M. Koprowski, Practical threshold rsa signatures without a trusted dealer, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2001), pp. 152–165

  26. A. De Santis, Y. Desmedt, Y. Frankel, M. Yung, How to share a function securely, in Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (ACM, 1994), pp. 522–533

  27. Y. Desmedt, Y. Frankel, Threshold cryptosystesns. Adv. Cryptol. 305–315 (1989)

  28. J. Fan, F. Vercauteren, Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Paper 2012/144 (2012)

  29. Y. Frankel, A practical protocol for large group oriented networks, in Workshop on the Theory and Application of of Cryptographic Techniques (Springer, 1989), pp. 56–61

  30. S. Garg, A. Jain, P. Mukherjee, R. Sinha, M. Wang, Y. Zhang, Cryptography with weights: Mpc, encryption and signatures, in Advances in Cryptology–CRYPTO 2023. ed. by H. Handschuh, A. Lysyanskaya (Springer, Cham, 2023), pp. 295–327

  31. R. Gennaro, S. Goldfeder, Fast multiparty threshold ecdsa with fast trustless setup, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), pp. 1179–1194

  32. R. Gennaro, S. Goldfeder, One round threshold ecdsa with identifiable abort. Cryptology ePrint Archive (2020)

  33. R. Gennaro, S. Goldfeder, A. Narayanan, Threshold-optimal dsa/ecdsa signatures and an application to bitcoin wallet security, in International Conference on Applied Cryptography and Network Security (Springer, 2016), pp. 156–174

  34. R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures. Inf. Comput. 164(1), 54–84 (2001)

  35. O. Goldreich, On (Valiant’s) Polynomial-Size Monotone Formula for Majority (Springer, Cham, 2020), pp. 17–23

  36. S.D. Gordon, F.-H. Liu, E. Shi, Constant-round mpc with fairness and guarantee of output delivery, in Annual Cryptology Conference (Springer, 2015), pp. 63–82

  37. A. Gupta, S. Mahajan, Using amplification to compute majority with small majority gates. Computational Complexity. 6(1), 46–63 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  38. K.D. Gur, J. Katz, T. Silde, Two-round threshold lattice-based signatures from threshold homomorphic encryption, in International Conference on Post-Quantum Cryptography (Springer, 2024), pp. 266–300

  39. S. Hoory, A. Magen, T. Pitassi, Monotone circuits for the majority function, in International Workshop on Approximation Algorithms for Combinatorial Optimization (Springer, 2006), pp. 410–425

  40. A. Jain, P.M.R. Rasmussen, A. Sahai, Threshold fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2017, 257 (2017)

  41. D. Lapidot, A. Shamir, Publicly verifiable non-interactive zero-knowledge proofs, in Conference on the Theory and Application of Cryptography (Springer, 1990), pp. 353–365

  42. Y. Lee, D. Micciancio, A.K, R. Choi, M. Deryabin, J. Eom, D. Yoo, Efficient fhew bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2023), pp. 227–256

  43. A. Lewko, B. Waters, Decentralizing attribute-based encryption, in Annual international Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2011), pp. 568–588

  44. Y. Lindell, Fast secure two-party ecdsa signing, in Annual International Cryptology Conference (Springer, 2017), pp. 613–644

  45. A. López-Alt, E. Tromer, V. Vaikuntanathan, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, in Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing (2012), pp. 1219–1234

  46. P. MacKenzie, M.K. Reiter, Two-party generation of dsa signatures. Int. J. Inf. Secur. 2(3), 218–239 (2004)

  47. P. Mukherjee, D. Wichs, Two round multiparty computation via multi-key fhe, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2016), pp. 735–763

  48. C Peikert, S. Shiehian, Multi-key fhe from lwe, revisited, in Theory of Cryptography Conference (Springer, 2016), pp. 217–238

  49. A.D. Santis, S. Micali, G. Persiano, Non-interactive zero-knowledge with preprocessing, in Conference on the Theory and Application of Cryptography (Springer, 1988), pp. 269–282

  50. A. Shamir, How to share a secret. Commun. ACM. 22(11), 612–613 (1979)

  51. V. Shoup, Practical threshold signatures, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2000), pp. 207–220

  52. D.R. Stinson, R. Strobl, Provably secure distributed schnorr signatures and a (t, n) threshold scheme for implicit certificates, in Australasian Conference on Information Security and Privacy (Springer, 2001), pp. 417–434

  53. G. Leslie, Valiant, Short monotone formulae for the majority function. J. Algorithm. 5(3), 363–366 (1984)

  54. Z. Wang, X. Fan, F.-H. Liu, Fe for inner products and its application to decentralized abe, in Public-Key Cryptography—PKC 2019. ed. by D. Lin, K. Sako (Springer, Cham, 2019), pp. 97–127

Download references

Acknowledgements

We would like to thank the anonymous reviewers of the Journal of Cryptology for their helpful comments and feedback to improve this paper. J.H.Cheon was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1A5A6000840). J.Kim was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No. RS-2024-00399491, Development of Privacy-Preserving Multiparty Computation Techniques for Secure Multiparty Data Integration).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiseung Kim.

Additional information

Communicated by Steven Galbraith.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Author list in alphabetical order; see https://www.ams.org/profession/leaders/culture/JointResearchandItsPublicationfinal.pdf.

This paper was reviewed by Sikhar Patranabis and an anonymous reviewer.

Appendices

About Approximation

We first introduce a useful inequalities to provide an approximation that we used. According to [22], \(c_s\) is bounded by

$$\begin{aligned} \frac{1}{\sqrt{\pi }}\cdot \frac{2s-1}{\sqrt{s-1/2}}< \frac{2s-1}{4^{s-1}}\cdot \left( {\begin{array}{c}2s-2\\ s-1\end{array}}\right) < \frac{1}{\sqrt{\pi }}\cdot \frac{2s-1}{\sqrt{s-1}} \end{aligned}$$

Then, we have the following series of inequalities. From an upper bound of \(c_s\), we get

$$\begin{aligned} \log _{c_s} (2s-1) + \log _s (2s-1)&\le \log _{2\sqrt{\frac{{s-1/2}}{\pi }}}(2s-1)+\log _s (2s) \end{aligned}$$

Since \(2s - 1\) is represented by \(\sqrt{\frac{s-1/2}{\pi }}^2 \cdot \frac{\pi }{2}\) and \(\log _s (2s) = 1 + \log _s 2\), the right-hand side is represented by

$$\begin{aligned} 2 + \log _{2\sqrt{\frac{{s-1/2}}{\pi }}}(\pi /2) + (1+\log _s 2). \end{aligned}$$

Since we only consider \(s \ge 2\), it holds that \(\frac{(s-1/2)}{\pi } \ge s/4\), which implies

$$\begin{aligned} 2\sqrt{\frac{{s-1/2}}{\pi }} \ge \sqrt{s}. \end{aligned}$$

Thus, we have

$$\begin{aligned} 2 + \log _{2\sqrt{\frac{{s-1/2}}{\pi }}}(\pi /2) + (1+\log _s 2) \le \log _{\sqrt{s}}(\pi /2) + 3 + \frac{1}{\log s}. \end{aligned}$$

Last, using \(\log \frac{\pi }{2} = 0.65149612947\), we have

$$\begin{aligned} \log _{\sqrt{s}}(\pi /2) + 3 + \frac{1}{\log s}&\le \frac{1.30299}{\log s} + 3 + \frac{1}{\log s} \\&\le 3 + \frac{2.30299}{\log s}. \end{aligned}$$

Consequently, we have

$$\begin{aligned} \frac{1}{\sqrt{\pi }}\cdot \frac{2s-1}{\sqrt{s-1/2}} \le 3 + \frac{2.30299}{\log s} \end{aligned}$$

Observation of \(\{0,1\}\)-LSSS with [53] construction

\(\{ {0,1} \}\)-LSSS is a family of linear secret sharing schemes that utilizes binary coefficients to recover the shared secret from secret shares, as defined in [14]. The use of monotone Boolean formulas [43] was proposed as an instantiation of \(\{ {0,1} \}\)-LSSS. However, the polynomial-sized expression of threshold functions was proven by Valiant and Goldreich [35, 53]. Recently, [40] proposed using a folklore algorithm to demonstrate that monotone Boolean formulas are a part of \(\{ {0,1} \}\)-LSSS. We briefly summarize the construction of threshold functions.

We focus on a threshold function with N/2-out-of-N parties, where N is even, for simplicity. Let \(\varphi \) be a level-0 formula which takes N bit-strings as input and returns one of the i-th input bits with some probability, where i is randomly chosen, or returns 0. For each \(i \ge 1\), the level-\((i+1)\) formula is defined as \(\varphi = (\varphi _1 \wedge \varphi _2)\vee (\varphi _3 \wedge \varphi _4)\), with \(\varphi _1,\varphi _2,\varphi _3,\varphi _4\) randomly selected from a family of level-i formulas. Note that to maintain independence, the level-i formulas will not be duplicated.

In classic works [35, 53], it was proved that with \(O(N^{5.3})\) level-0 formulas, a N/2-out-of-N threshold function can be expressed with a level-t formula with non-negligible probability, where \(t = O(\log N)\). Building upon this result, [40] showed that this level-t formula can be converted into a \(\{ {0,1} \}\)-LSSS for threshold functions.

To share a secret key \({\textsf {sk}} \in {{\mathbb {Z}}}_q\), \(\{ {0,1} \}\)-LSSS constructs a matrix \(\textbf{M}\in {{\mathbb {Z}}}_q^{\ell \times m}\), called the share matrix, with \(m,\ell \gg N\), and distributes a subset of \(\{ {w_i} \}_{i \in [\ell ]}\) to each party. The vector \(\textbf{w}= (w_i) = \textbf{M}\cdot (\textsf {sk}, r_2,\ldots , r_m)^T\) is computed using randomly sampled \(r_i \leftarrow {{\mathbb {Z}}}_q\). The size of \(\ell \) is equal to the size of level-t formula, \(O(N^{5.3})\), and m is one more than the number of AND gates in level-t formula. This results in a total of \(O(N^{5.3})\) secret shares. \(\{ {0,1} \}\)-LSSS for threshold functions in [40] is constructed as follows:

  1. 1.

    Consider level-0 formulas \(\varphi _i\), where \(i \in [O(N^{5.3})]\).

  2. 2.

    Create a level-\((i+1)\) formula \(\varphi \) by combining \(\varphi _1 \wedge \varphi _2\) and \(\varphi _3 \wedge \varphi _4\) through an OR operation, where \(\varphi _1,\varphi _2,\varphi _3,\varphi _4\) are randomly selected level-i formulas.

  3. 3.

    Repeat the process until i reaches t, which results in a level-t formula that is equivalent to the N/2-out-of-N threshold function with non-negligible probability.

  4. 4.

    Use the folklore algorithm to convert the level-t formula into a share matrix \(\textbf{M}\).

Note that throughout this paper, the folklore algorithm is considered a black-box method that converts circuits consisting of only AND and OR gates into matrices, except for this section. For more insightful discussion on the algorithm, please refer to [14, 40] (Fig. 4).

Fig. 4
figure 4

Folklore Algorithm in [40]

1.1 Regarding \(\{ {0,1} \}\)-LSSS as Iterations of Matrices

supp]subsec: revisit

We reinterpret a secret sharing algorithm for threshold functions by utilizing the iterative steps of Boolean formula construction described in [53]. This allows us to construct a share matrix \(\textbf{M}\) through iterative matrix multiplications.

[53] proves that the threshold circuit is an iterative construction of the Boolean monotone formulas: For i, the level-\((i+1)\) formula \(\varphi ^{(i+1)}\) is generated from four level-i formulas, \(\varphi _1^{(i)},\varphi _2^{(i)},\varphi _3^{(i)}\) and \(\varphi _4^{(i)}\). Specifically, \(\varphi ^{(i+1)} = (\varphi ^{(i)}_1 \wedge \varphi ^{(i)}_2)\vee (\varphi ^{(i)}_3 \wedge \varphi ^{(i)}_4)\).

We first claim that the relation between \(\varphi ^{(i+1)}\) and \(\{ {\varphi _j^{(i)}} \}_{j\in \{ {1,2,3,4} \}}\) can be represented as a binary tree of depth 2, as in the structure shown in Fig. 5. Since this binary tree is composed of AND and OR gates, we can directly apply the folklore algorithm to the tree. As a result, there exists a small matrix \(\textbf{D}\) that corresponds to this binary tree, with the leaf nodes being \(\{ {\varphi _j^{(i)}} \}_{j\in \{ {1,2,3,4} \}}\). Here, \(\textbf{D}\) is defined by

$$\begin{aligned} \textbf{D}= \begin{bmatrix} 1 & \quad 1 \\ 1 & \quad 1 \\ 0 & \quad -1 \\ 0 & \quad -1 \end{bmatrix} \in {{\mathbb {Z}}}_q^{4 \times 2}. \end{aligned}$$
Fig. 5
figure 5

Boolean formula corresponds to secret share

Furthermore, the correspondence between the binary tree and the matrix is established through the relationship

$$\begin{aligned} \begin{bmatrix} \textsf {sk}_{\varphi ^{(i)}_1} \\ \textsf {sk}_{\varphi ^{(i)}_2} \\ \textsf {sk}_{\varphi ^{(i)}_3} \\ \textsf {sk}_{\varphi ^{(i)}_4} \end{bmatrix} = \textbf{D}\cdot \begin{bmatrix} \textsf {sk}_{\varphi ^{(i+1)}} \\ r \end{bmatrix} \end{aligned}$$

where \(r \in {{\mathbb {Z}}}_q\) is a random integer. Thus, the operation \(\varphi ^{(i+1)} = (\varphi ^{(i)}_1 \wedge \varphi ^{(i)}_2)\vee (\varphi ^{(i)}_3 \wedge \varphi ^{(i)}_4)\) can be viewed as a matrix multiplication with \(\textbf{D}\). Similarly, the representation of the formula \(\varphi ^{(i+1)}\) from 16 \(\varphi ^{(i-1)}\) formulas can be represented as a matrix \(\textbf{I}_4 \otimes \textbf{D}\in {{\mathbb {Z}}}^{16 \times 8}\), where \(\textbf{I}_4\) is the 4-dimensional identity matrix. Consequently, there is a matrix \(\textbf{M}\) which corresponds to circuit representations of level-t formula \(\varphi ^{(t)}\) from level-0 \(\varphi ^{(0)}\) formulas.

By the mathematical induction, we obtain a share matrix \(\textbf{M}\) of \(\{ {0,1} \}\)-LSSS.Footnote 8 Furthermore, \(\textsf {Share}\) algorithm of \(\{ {0,1} \}\)-LSSS is regarded by computing \(\textbf{M}\cdot \textbf{v}\) for some \(\textbf{v}\).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheon, J.H., Cho, W. & Kim, J. Improved Universal Thresholdizer from Iterative Shamir Secret Sharing. J Cryptol 38, 15 (2025). https://doi.org/10.1007/s00145-024-09536-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00145-024-09536-z

Keywords