Abstract
The universal thresholdizer, introduced at CRYPTO’18, is a cryptographic scheme that transforms any cryptosystem into a threshold variant, thereby enhancing its applicability in threshold cryptography. It enables black-box construction of one-round threshold signature schemes based on the Learning with Errors problem, and similarly, facilitates one-round threshold ciphertext-attack secure public-key encryption when integrated with non-threshold schemes. Current constructions of universal thresholdizer are fundamentally built upon linear secret sharing schemes. One approach employs Shamir secret sharing, which lacks compactness and results in ciphertext sizes of \(O(N \log N)\), where N is the number of parties involved in the threshold system, and another approach uses the \(\{0,1\}\)-linear secret sharing scheme (\(\{0,1\}\)-LSSS), which is compact but induces high communication costs due to requiring \(O(N^{5.3})\) secret shares. In this work, we introduce a communication-efficient universal thresholdizer by revising the linear secret sharing scheme. We propose a specialized linear secret sharing scheme, called TreeSSS, which reduces the number of required secret shares to \(O(N^{3+o(1)})\) while maintaining the compactness of the universal thresholdizer. TreeSSS can also serve as a subroutine for constructing lattice-based t-out-of-N threshold cryptographic primitives such as threshold fully homomorphic encryptions and threshold signatures. In this context, TreeSSS offers the advantage of lower communication overhead due to the reduced number of secret shares involved.






Notes
To put it simply, the property of compactness is maintained when the magnitude of q is bounded by a polynomial function of N.
\(\textsf {nTFHE.Eval}(C_\textsf {ct}, \{ {{\textsf {nct}}_{\textsf {i}}} \})\) can be regarded as bootstrapping step of \({\textsf {nTFHE}}\).
In this case, we define a particular partition that may not appear to be randomly distributed. However, if we repeat the process of secret key distribution in sufficient detail, [53] assures us that a linear secret sharing scheme can be successfully constructed for a threshold structure, provided that secret shares are distributed randomly among the parties.
The method for distributing level-L secret shares is exactly the same as \(\{ {0,1} \}\)-LSSS. Informally, the distributor randomly partitions the set \({1,\ldots ,(2s-1)^L}\) into N subsets, and sends the level-L secret shares corresponding to the indices within these N subsets to each respective party. We leave the detailed method in Sect. 4.2.
To prevent information leakage, the large error should be added. However, we omit the error for simplicity.
The detailed computation of approximations will be given by Appendix A.
The proof is exactly the same as that of Proposition 4.5 except for using \(\textbf{D}\) rather than \(\textbf{V}_s\).
References
S. Agrawal, X. Boyen, V. Vaikuntanathan, P. Voulgaris, H. Wee, Functional encryption for threshold functions (or fuzzy ibe) from lattices, in Public Key Cryptography—PKC 2012. ed. by M. Fischlin, J. Buchmann, M. Manulis (Springer, Berlin, 2012), pp. 280–297
S. Agrawal, D. Stehlé, A. Yadav, Round-optimal lattice-based threshold signatures, revisited, in 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022) (Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2022)
B. Applebaum, O. Nir, B. Pinkas, How to recover a secret with o(n) additions, in Advances in Cryptology—CRYPTO 2023. ed. by H. Handschuh, A. Lysyanskaya (Springer, Cham, 2023), pp. 236–262
G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan, D. Wichs, Multiparty computation with low communication, computation and interaction via threshold fhe, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2012), pp. 483–501
S. Badrinarayanan, A. Jain, N. Manohar, A. Sahai, Secure mpc: laziness leads to god, in Advances in Cryptology—ASIACRYPT 2020. ed. by S. Moriai, H. Wang (Springer, Cham, 2020), pp. 120–150
M. Ball, A. Çakan, T. Malkin, Linear threshold secret-sharing with binary reconstruction, in 2nd Conference on Information-Theoretic Cryptography (ITC 2021), volume 199 of Leibniz International Proceedings in Informatics (LIPIcs). ed. by S. Tessaro (Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2021), pp. 11–1222
R. Bendlin, I. Damgård, Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems, in Theory of Cryptography Conference (Springer, 2010), pp. 201–218
F. Benhamouda, S. Halevi, L. Stambler, Weighted secret sharing from wiretap channels, in 4th Conference on Information-Theoretic Cryptography (ITC 2023), volume 267 of Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, ed. by K.-M. Chung (Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2023), pp. 81–819
N. Bitansky, Verifiable random functions from non-interactive witness-indistinguishable proofs. J. Cryptol. 33(2), 459–493 (2020)
G.R. Blakley 1985 Catherine Meadows, Security of ramp schemes. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology (Springer, Berlin), pp. 242–268
M. Blum, Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News. 15(1), 23–27 (1983)
A. Boldyreva, Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme, in International Workshop on Public Key Cryptography (Springer, 2003), pp. 31–46
D. Boneh, R. Gennaro, S. Goldfeder, Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security, in International Conference on Cryptology and Information Security in Latin America (Springer, 2017), pp. 352–377
D. Boneh, R. Gennaro, S. Goldfeder, A. Jain, S. Kim, P.M.R. Rasmussen, A. Sahai, Threshold cryptosystems from threshold fully homomorphic encryption, in Annual International Cryptology Conference (Springer, 2018), pp. 565–596
J.-P. Bossuat, R. Cammarota, J.H. Cheon, I. Chillotti, B.R. Curtis, W. Dai, H. Gong, E. Hales, D. Kim, B. Kumara et al., Security guidelines for implementing homomorphic encryption. Cryptology ePrint Archive (2024)
K. Boudgoust, P. Scholl, Simple threshold (fully homomorphic) encryption from lwe with polynomial modulus, in Advances in Cryptology—ASIACRYPT 2023. ed. by J. Guo, R. Steinfeld (Springer, Singapore, 2023), pp. 371–404
Z. Brakerski, Fully homomorphic encryption without modulus switching from classical gapsvp, in Advances in Cryptology—CRYPTO 2012 (Springer, Berlin, 2012), pp. 868–886
Z. Brakerski, C. Gentry, V. Vaikuntanathan, (leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 1–36 (2014)
Z. Brakerski, R. Perlman, Lattice-based fully dynamic multi-key fhe with short ciphertexts, in Annual Cryptology Conference (Springer, 2016), pp. 190–213
R. Canetti, R. Gennaro, S. Goldfeder, N. Makriyannis, U. Peled, Uc non-interactive, proactive, threshold ECDSA with identifiable aborts, in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 1769–1787
J.H. Cheon, A. Kim, M. Kim, Y. Song, Homomorphic encryption for arithmetic of approximate numbers, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, New York, 2017), pp. 409–437
J H. Cheon, D. Kim, D. Kim, Efficient homomorphic comparison methods with optimal complexity, in Advances in Cryptology–ASIACRYPT 2020, ed. by S. Moriai, H. Wang (Springer, Cham, 2020), pp. 221–256
I. Chillotti, N. Gama, M. Georgieva, M. Izabachene, Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds, in international Conference on the Theory and Application of Cryptology and Information Security (Springer, 2016), pp. 3–33
S. Chowdhury, S. Sinha, A. Singh, S. Mishra, C. Chaudhary, S. Patranabis, P. Mukherjee, A. Chatterjee, D. Mukhopadhyay, Efficient fhe with threshold decryption and application to real-time systems. Cryptology ePrint Archive (2022)
I. Damgård, M. Koprowski, Practical threshold rsa signatures without a trusted dealer, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2001), pp. 152–165
A. De Santis, Y. Desmedt, Y. Frankel, M. Yung, How to share a function securely, in Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (ACM, 1994), pp. 522–533
Y. Desmedt, Y. Frankel, Threshold cryptosystesns. Adv. Cryptol. 305–315 (1989)
J. Fan, F. Vercauteren, Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive, Paper 2012/144 (2012)
Y. Frankel, A practical protocol for large group oriented networks, in Workshop on the Theory and Application of of Cryptographic Techniques (Springer, 1989), pp. 56–61
S. Garg, A. Jain, P. Mukherjee, R. Sinha, M. Wang, Y. Zhang, Cryptography with weights: Mpc, encryption and signatures, in Advances in Cryptology–CRYPTO 2023. ed. by H. Handschuh, A. Lysyanskaya (Springer, Cham, 2023), pp. 295–327
R. Gennaro, S. Goldfeder, Fast multiparty threshold ecdsa with fast trustless setup, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), pp. 1179–1194
R. Gennaro, S. Goldfeder, One round threshold ecdsa with identifiable abort. Cryptology ePrint Archive (2020)
R. Gennaro, S. Goldfeder, A. Narayanan, Threshold-optimal dsa/ecdsa signatures and an application to bitcoin wallet security, in International Conference on Applied Cryptography and Network Security (Springer, 2016), pp. 156–174
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin, Robust threshold dss signatures. Inf. Comput. 164(1), 54–84 (2001)
O. Goldreich, On (Valiant’s) Polynomial-Size Monotone Formula for Majority (Springer, Cham, 2020), pp. 17–23
S.D. Gordon, F.-H. Liu, E. Shi, Constant-round mpc with fairness and guarantee of output delivery, in Annual Cryptology Conference (Springer, 2015), pp. 63–82
A. Gupta, S. Mahajan, Using amplification to compute majority with small majority gates. Computational Complexity. 6(1), 46–63 (1996)
K.D. Gur, J. Katz, T. Silde, Two-round threshold lattice-based signatures from threshold homomorphic encryption, in International Conference on Post-Quantum Cryptography (Springer, 2024), pp. 266–300
S. Hoory, A. Magen, T. Pitassi, Monotone circuits for the majority function, in International Workshop on Approximation Algorithms for Combinatorial Optimization (Springer, 2006), pp. 410–425
A. Jain, P.M.R. Rasmussen, A. Sahai, Threshold fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2017, 257 (2017)
D. Lapidot, A. Shamir, Publicly verifiable non-interactive zero-knowledge proofs, in Conference on the Theory and Application of Cryptography (Springer, 1990), pp. 353–365
Y. Lee, D. Micciancio, A.K, R. Choi, M. Deryabin, J. Eom, D. Yoo, Efficient fhew bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2023), pp. 227–256
A. Lewko, B. Waters, Decentralizing attribute-based encryption, in Annual international Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2011), pp. 568–588
Y. Lindell, Fast secure two-party ecdsa signing, in Annual International Cryptology Conference (Springer, 2017), pp. 613–644
A. López-Alt, E. Tromer, V. Vaikuntanathan, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, in Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing (2012), pp. 1219–1234
P. MacKenzie, M.K. Reiter, Two-party generation of dsa signatures. Int. J. Inf. Secur. 2(3), 218–239 (2004)
P. Mukherjee, D. Wichs, Two round multiparty computation via multi-key fhe, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2016), pp. 735–763
C Peikert, S. Shiehian, Multi-key fhe from lwe, revisited, in Theory of Cryptography Conference (Springer, 2016), pp. 217–238
A.D. Santis, S. Micali, G. Persiano, Non-interactive zero-knowledge with preprocessing, in Conference on the Theory and Application of Cryptography (Springer, 1988), pp. 269–282
A. Shamir, How to share a secret. Commun. ACM. 22(11), 612–613 (1979)
V. Shoup, Practical threshold signatures, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, 2000), pp. 207–220
D.R. Stinson, R. Strobl, Provably secure distributed schnorr signatures and a (t, n) threshold scheme for implicit certificates, in Australasian Conference on Information Security and Privacy (Springer, 2001), pp. 417–434
G. Leslie, Valiant, Short monotone formulae for the majority function. J. Algorithm. 5(3), 363–366 (1984)
Z. Wang, X. Fan, F.-H. Liu, Fe for inner products and its application to decentralized abe, in Public-Key Cryptography—PKC 2019. ed. by D. Lin, K. Sako (Springer, Cham, 2019), pp. 97–127
Acknowledgements
We would like to thank the anonymous reviewers of the Journal of Cryptology for their helpful comments and feedback to improve this paper. J.H.Cheon was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1A5A6000840). J.Kim was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No. RS-2024-00399491, Development of Privacy-Preserving Multiparty Computation Techniques for Secure Multiparty Data Integration).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Steven Galbraith.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Author list in alphabetical order; see https://www.ams.org/profession/leaders/culture/JointResearchandItsPublicationfinal.pdf.
This paper was reviewed by Sikhar Patranabis and an anonymous reviewer.
Appendices
About Approximation
We first introduce a useful inequalities to provide an approximation that we used. According to [22], \(c_s\) is bounded by
Then, we have the following series of inequalities. From an upper bound of \(c_s\), we get
Since \(2s - 1\) is represented by \(\sqrt{\frac{s-1/2}{\pi }}^2 \cdot \frac{\pi }{2}\) and \(\log _s (2s) = 1 + \log _s 2\), the right-hand side is represented by
Since we only consider \(s \ge 2\), it holds that \(\frac{(s-1/2)}{\pi } \ge s/4\), which implies
Thus, we have
Last, using \(\log \frac{\pi }{2} = 0.65149612947\), we have
Consequently, we have
Observation of \(\{0,1\}\)-LSSS with [53] construction
\(\{ {0,1} \}\)-LSSS is a family of linear secret sharing schemes that utilizes binary coefficients to recover the shared secret from secret shares, as defined in [14]. The use of monotone Boolean formulas [43] was proposed as an instantiation of \(\{ {0,1} \}\)-LSSS. However, the polynomial-sized expression of threshold functions was proven by Valiant and Goldreich [35, 53]. Recently, [40] proposed using a folklore algorithm to demonstrate that monotone Boolean formulas are a part of \(\{ {0,1} \}\)-LSSS. We briefly summarize the construction of threshold functions.
We focus on a threshold function with N/2-out-of-N parties, where N is even, for simplicity. Let \(\varphi \) be a level-0 formula which takes N bit-strings as input and returns one of the i-th input bits with some probability, where i is randomly chosen, or returns 0. For each \(i \ge 1\), the level-\((i+1)\) formula is defined as \(\varphi = (\varphi _1 \wedge \varphi _2)\vee (\varphi _3 \wedge \varphi _4)\), with \(\varphi _1,\varphi _2,\varphi _3,\varphi _4\) randomly selected from a family of level-i formulas. Note that to maintain independence, the level-i formulas will not be duplicated.
In classic works [35, 53], it was proved that with \(O(N^{5.3})\) level-0 formulas, a N/2-out-of-N threshold function can be expressed with a level-t formula with non-negligible probability, where \(t = O(\log N)\). Building upon this result, [40] showed that this level-t formula can be converted into a \(\{ {0,1} \}\)-LSSS for threshold functions.
To share a secret key \({\textsf {sk}} \in {{\mathbb {Z}}}_q\), \(\{ {0,1} \}\)-LSSS constructs a matrix \(\textbf{M}\in {{\mathbb {Z}}}_q^{\ell \times m}\), called the share matrix, with \(m,\ell \gg N\), and distributes a subset of \(\{ {w_i} \}_{i \in [\ell ]}\) to each party. The vector \(\textbf{w}= (w_i) = \textbf{M}\cdot (\textsf {sk}, r_2,\ldots , r_m)^T\) is computed using randomly sampled \(r_i \leftarrow {{\mathbb {Z}}}_q\). The size of \(\ell \) is equal to the size of level-t formula, \(O(N^{5.3})\), and m is one more than the number of AND gates in level-t formula. This results in a total of \(O(N^{5.3})\) secret shares. \(\{ {0,1} \}\)-LSSS for threshold functions in [40] is constructed as follows:
-
1.
Consider level-0 formulas \(\varphi _i\), where \(i \in [O(N^{5.3})]\).
-
2.
Create a level-\((i+1)\) formula \(\varphi \) by combining \(\varphi _1 \wedge \varphi _2\) and \(\varphi _3 \wedge \varphi _4\) through an OR operation, where \(\varphi _1,\varphi _2,\varphi _3,\varphi _4\) are randomly selected level-i formulas.
-
3.
Repeat the process until i reaches t, which results in a level-t formula that is equivalent to the N/2-out-of-N threshold function with non-negligible probability.
-
4.
Use the folklore algorithm to convert the level-t formula into a share matrix \(\textbf{M}\).
Note that throughout this paper, the folklore algorithm is considered a black-box method that converts circuits consisting of only AND and OR gates into matrices, except for this section. For more insightful discussion on the algorithm, please refer to [14, 40] (Fig. 4).
Folklore Algorithm in [40]
1.1 Regarding \(\{ {0,1} \}\)-LSSS as Iterations of Matrices
supp]subsec: revisit
We reinterpret a secret sharing algorithm for threshold functions by utilizing the iterative steps of Boolean formula construction described in [53]. This allows us to construct a share matrix \(\textbf{M}\) through iterative matrix multiplications.
[53] proves that the threshold circuit is an iterative construction of the Boolean monotone formulas: For i, the level-\((i+1)\) formula \(\varphi ^{(i+1)}\) is generated from four level-i formulas, \(\varphi _1^{(i)},\varphi _2^{(i)},\varphi _3^{(i)}\) and \(\varphi _4^{(i)}\). Specifically, \(\varphi ^{(i+1)} = (\varphi ^{(i)}_1 \wedge \varphi ^{(i)}_2)\vee (\varphi ^{(i)}_3 \wedge \varphi ^{(i)}_4)\).
We first claim that the relation between \(\varphi ^{(i+1)}\) and \(\{ {\varphi _j^{(i)}} \}_{j\in \{ {1,2,3,4} \}}\) can be represented as a binary tree of depth 2, as in the structure shown in Fig. 5. Since this binary tree is composed of AND and OR gates, we can directly apply the folklore algorithm to the tree. As a result, there exists a small matrix \(\textbf{D}\) that corresponds to this binary tree, with the leaf nodes being \(\{ {\varphi _j^{(i)}} \}_{j\in \{ {1,2,3,4} \}}\). Here, \(\textbf{D}\) is defined by
Furthermore, the correspondence between the binary tree and the matrix is established through the relationship
where \(r \in {{\mathbb {Z}}}_q\) is a random integer. Thus, the operation \(\varphi ^{(i+1)} = (\varphi ^{(i)}_1 \wedge \varphi ^{(i)}_2)\vee (\varphi ^{(i)}_3 \wedge \varphi ^{(i)}_4)\) can be viewed as a matrix multiplication with \(\textbf{D}\). Similarly, the representation of the formula \(\varphi ^{(i+1)}\) from 16 \(\varphi ^{(i-1)}\) formulas can be represented as a matrix \(\textbf{I}_4 \otimes \textbf{D}\in {{\mathbb {Z}}}^{16 \times 8}\), where \(\textbf{I}_4\) is the 4-dimensional identity matrix. Consequently, there is a matrix \(\textbf{M}\) which corresponds to circuit representations of level-t formula \(\varphi ^{(t)}\) from level-0 \(\varphi ^{(0)}\) formulas.
By the mathematical induction, we obtain a share matrix \(\textbf{M}\) of \(\{ {0,1} \}\)-LSSS.Footnote 8 Furthermore, \(\textsf {Share}\) algorithm of \(\{ {0,1} \}\)-LSSS is regarded by computing \(\textbf{M}\cdot \textbf{v}\) for some \(\textbf{v}\).
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Cheon, J.H., Cho, W. & Kim, J. Improved Universal Thresholdizer from Iterative Shamir Secret Sharing. J Cryptol 38, 15 (2025). https://doi.org/10.1007/s00145-024-09536-z
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00145-024-09536-z