115,809 research outputs found
Communication Efficient Secret Sharing
A secret sharing scheme is a method to store information securely and
reliably. Particularly, in a threshold secret sharing scheme, a secret is
encoded into shares, such that any set of at least shares suffice to
decode the secret, and any set of at most shares reveal no
information about the secret. Assuming that each party holds a share and a user
wishes to decode the secret by receiving information from a set of parties; the
question we study is how to minimize the amount of communication between the
user and the parties. We show that the necessary amount of communication,
termed "decoding bandwidth", decreases as the number of parties that
participate in decoding increases. We prove a tight lower bound on the decoding
bandwidth, and construct secret sharing schemes achieving the bound.
Particularly, we design a scheme that achieves the optimal decoding bandwidth
when parties participate in decoding, universally for all . The scheme is based on Shamir's secret sharing scheme and preserves its
simplicity and efficiency. In addition, we consider secure distributed storage
where the proposed communication efficient secret sharing schemes further
improve disk access complexity during decoding.Comment: submitted to the IEEE Transactions on Information Theory. New
references and a new construction adde
Universal Communication Efficient Quantum Threshold Secret Sharing Schemes
Quantum secret sharing (QSS) is a cryptographic protocol in which a quantum
secret is distributed among a number of parties where some subsets of the
parties are able to recover the secret while some subsets are unable to recover
the secret. In the standard quantum threshold secret sharing scheme,
any subset of or more parties out of the total parties can recover the
secret while other subsets have no information about the secret. But recovery
of the secret incurs a communication cost of at least qudits for every
qudit in the secret. Recently, a class of communication efficient QSS schemes
were proposed which can improve this communication cost to by
contacting parties where is fixed prior to the distribution of
shares. In this paper, we propose a more general class of quantum
secret sharing schemes with low communication complexity. Our schemes are
universal in the sense that the combiner can contact any number of parties to
recover the secret with communication efficiency i.e. any in the range
can be chosen by the combiner. This is the first such class of
universal communication efficient quantum threshold schemes
Communication Efficient Secret Sharing in the Presence of Malicious Adversary
Consider the communication efficient secret sharing problem. A dealer wants
to share a secret with parties such that any parties can
reconstruct the secret and any parties eavesdropping on their shares
obtain no information about the secret. In addition, a legitimate user
contacting any , , parties to decode the secret can do so by
reading and downloading the minimum amount of information needed. We are
interested in communication efficient secret sharing schemes that tolerate the
presence of malicious parties actively corrupting their shares and the data
delivered to the users. The knowledge of the malicious parties about the secret
is restricted to the shares they obtain. We characterize the capacity, i.e.
maximum size of the secret that can be shared. We derive the minimum amount of
information needed to to be read and communicated to a legitimate user to
decode the secret from parties, . Error-correcting codes do
not achieve capacity in this setting. We construct codes that achieve capacity
and achieve minimum read and communication costs for all possible values of
. Our codes are based on Staircase codes, previously introduced for
communication efficient secret sharing, and on the use of a pairwise hashing
scheme used in distributed data storage and network coding settings to detect
errors inserted by a limited knowledge adversary.Comment: Extended version of a paper submitted to ISIT 202
The GHZ state in secret sharing and entanglement simulation
In this note, we study some properties of the GHZ state. First, we present a
quantum secret sharing scheme in which the participants require only classical
channels in order to reconstruct the secret; our protocol is significantly more
efficient than the trivial usage of teleportation. Second, we show that the
classical simulation of an n-party GHZ state requires at least n log n - 2n
bits of communication. Finally, we present a problem simpler than the complete
simulation of the multi-party GHZ state, that could lead to a no-go theorem for
GHZ state simulation.Comment: 5 page
- β¦