the torsion limit for algebraic function fields and its
play

The Torsion-Limit for Algebraic Function Fields and Its Application - PowerPoint PPT Presentation

The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing Ignacio Cascudo (CWI Amsterdam) Ronald Cramer (CWI & Leiden Univ.) Chaoping Xing (NTU Singapore) CRYPTO 2011 Thursday, August 18, 2011


  1. The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing Ignacio Cascudo (CWI Amsterdam) Ronald Cramer (CWI & Leiden Univ.) Chaoping Xing (NTU Singapore) CRYPTO 2011 Thursday, August 18, 2011 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  2. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  3. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that The “secret” coordinate* of C can take any value in F k q . 1 *Think of x ∈ C as x = ( x 0 , x 1 , . . . , x n ) where: x 0 ∈ F k q secret “coordinate” x 1 , . . . , x n ∈ F q share coordinates. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  4. n -Codes Let F q be a finite field, k , n ∈ Z ≥ 1 ( k “size of the secret”, n “number of shares”). Definition ( n -Code) An n -code for F k q is a F q -vector subspace C ⊂ F k q × F n q such that The “secret” coordinate* of C can take any value in F k q . 1 The n “share” coordinates of C jointly determine the secret 2 coordinate. *Think of x ∈ C as x = ( x 0 , x 1 , . . . , x n ) where: x 0 ∈ F k q secret “coordinate” x 1 , . . . , x n ∈ F q share coordinates. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  5. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  6. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Definition ( t -Disconnected and t -Uniform n -Code) An n -code C for F k q is t-disconnected if t = 0, or else if 1 ≤ t < n , the secret is “ independent ” of any t shares. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  7. Definition ( r -reconstructing) An n -code C for F k q is r-reconstructing (1 ≤ r ≤ n ) if it holds that any r shares determine the secret. Note that an n -code is n -reconstructing by definition. Definition ( t -Disconnected and t -Uniform n -Code) An n -code C for F k q is t-disconnected if t = 0, or else if 1 ≤ t < n , the secret is “ independent ” of any t shares. If, additionally, any set of t shares is uniformly distributed in F t q C has t-uniformity . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  8. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  9. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  10. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. But : the share coordinates of C ∗ d need not determine the secret coordinate. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  11. Definition (Powers of an n -Code) Let d ∈ Z > 0 .For C an n -code for F k q , let C ∗ d := F q < { c ( 1 ) ∗ . . . ∗ c ( d ) : c ( 1 ) , . . . , c ( d ) ∈ C } > . (where ∗ denotes coordinatewise product) Remark (Powering Need Not Preserve n -Code) q be an n-code for S. Consider C ∗ d (d ≥ 2 ). Let C ⊂ F k q × F n Trivially, the secret coordinate of C ∗ d can take any value. But : the share coordinates of C ∗ d need not determine the secret coordinate. Thus: C ∗ d need not be an n -code for F k q . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  12. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  13. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 The arithmetic SSS has uniformity if, in addition, the n -code C has t -uniformity. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  14. Arithmetic Secret Sharing Schemes Definition An ( n , t , d , r ) -arithmetic secret sharing scheme for F k q (over F q ) is an n -code C for F k q such that: t ≥ 1, d ≥ 2. 1 The n -code C is t -disconnected. 2 C ∗ d is in fact an n -code for F k q . 3 The n -code C ∗ d is r -reconstructing. 4 The arithmetic SSS has uniformity if, in addition, the n -code C has t -uniformity. An ( n , t , 2 , n − t ) -arithmetic SSS is a t-strong multiplicative linear SSS (Cramer/Damgaard/Maurer EUROCRYPT 2000). This notion is in turn generalized by arithmetic codices. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  15. Asymptotics of Arithmetic Secret Sharing Schemes Remark (Arithmetic SSS exist) If n + k ≤ q and d ( t + k − 1 ) < n − t, then: Shamir (or Franklin/Yung for k > 1 ) schemes are ( n , t , d , n − t ) -arithmetic SSS with uniformity for F k q . Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  16. Asymptotics of Arithmetic Secret Sharing Schemes Remark (Arithmetic SSS exist) If n + k ≤ q and d ( t + k − 1 ) < n − t, then: Shamir (or Franklin/Yung for k > 1 ) schemes are ( n , t , d , n − t ) -arithmetic SSS with uniformity for F k q . Question (2006): What happens if q is fixed and n is unbounded? Can positive rates ( t = Ω( n ) ) be achieved? (Note: We consider d constant, as otherwise t = Ω( n ) is provably imposible). Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  17. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  18. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Chen/Cramer (2006): Yes, if A ( q ) > 2 d .* Includes q square with q > ( 2 d + 1 ) 2 and all q very large. * A ( q ) Ihara’s constant of F q Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  19. Previous results Can positive rates ( t = Ω( n ) ) be achieved? Chen/Cramer (2006): Yes, if A ( q ) > 2 d .* Includes q square with q > ( 2 d + 1 ) 2 and all q very large. Cascudo/Chen/Cramer/Xing(2009): For d = 2 and without uniformity , any finite field F q . * A ( q ) Ihara’s constant of F q Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  20. Applications Original application: IT-secure multi-party computation, malicious adversary case (Cramer/Damgaard/Maurer 2000). Asymptotical version of BenOr/Goldwasser/Wigderson88, Chaum/Crépeau/Damgaard88 Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

  21. Applications Original application: IT-secure multi-party computation, malicious adversary case (Cramer/Damgaard/Maurer 2000). Asymptotical version of BenOr/Goldwasser/Wigderson88, Chaum/Crépeau/Damgaard88 But lately: Unexpected applications in two-party cryptography , usually via MPC-in-the-head paradigm: “secure two-party computation” with small error and low communication . “Players” are virtual processes!. Cascudo, Cramer, Xing The Torsion-Limit for Algebraic Function Fields and Its...

Recommend


More recommend