Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
98 tokens/sec
GPT-4o
8 tokens/sec
Gemini 2.5 Pro Pro
47 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Repairing Reed-Solomon Codes over Prime Fields via Exponential Sums (2402.02358v1)

Published 4 Feb 2024 in cs.IT and math.IT

Abstract: This paper presents two repair schemes for low-rate Reed-Solomon (RS) codes over prime fields that can repair any node by downloading a constant number of bits from each surviving node. The total bandwidth resulting from these schemes is greater than that incurred during trivial repair; however, this is particularly relevant in the context of leakage-resilient secret sharing. In that framework, our results provide attacks showing that $k$-out-of-$n$ Shamir's Secret Sharing over prime fields for small $k$ is not leakage-resilient, even when the parties leak only a constant number of bits. To the best of our knowledge, these are the first such attacks. Our results are derived from a novel connection between exponential sums and the repair of RS codes. Specifically, we establish that non-trivial bounds on certain exponential sums imply the existence of explicit nonlinear repair schemes for RS codes over prime fields.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (32)
  1. On the local leakage resilience of linear secret sharing schemes. Journal of Cryptology, 34(2):1–65, 2021.
  2. An improved mordell type bound for exponential sums. Proceedings of the American Mathematical Society, 133(2):313–320, 2005.
  3. Nonlinear repair of reed-solomon codes. IEEE Transactions on Information Theory, 68(8):5165–5177, 2022.
  4. Network coding for distributed storage systems. IEEE transactions on information theory, 56(9):4539–4551, 2010.
  5. Practical considerations in repairing reed-solomon codes. arXiv preprint arXiv:2205.11015, 2022.
  6. Fractional repetition codes for repair in distributed storage systems. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 1510–1517. IEEE, 2010.
  7. Data secrecy in distributed storage systems under exact repair. In 2013 International Symposium on Network Coding (NetCod), pages 1–6. IEEE, 2013.
  8. Minimum storage regenerating codes for all parameters. IEEE Transactions on Information Theory, 63(10):6318–6328, 2017.
  9. Repairing Reed-Solomon codes. IEEE transactions on Information Theory, 63(9):5684–5698, 2017.
  10. DR Heath-Brown. Arithmetic applications of Kloosterman sums. Nieuw Archief voor Wiskunde, 1:380–384, 2000.
  11. On z4-linear Goethals codes and Kloosterman sums. Designs, Codes and Cryptography, 17(1):269–288, 1999.
  12. Analytic number theory, volume 53. American Mathematical Soc., 2021.
  13. New extension of the weil bound for character sums with applications to coding. In 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pages 788–796. IEEE, 2011.
  14. New bounds on the local leakage resilience of shamir’s secret sharing scheme. Cryptology ePrint Archive, 2023.
  15. HD Kloosterman. On the representation of numbers in the formax 2+ by 2+ cz 2+ dt 2. Acta mathematica, 49(3):407–464, 1927.
  16. Maxim Aleksandrovich Korolev. Karatsuba’s method for estimating kloosterman sums. Sbornik: Mathematics, 207(8):1142, 2016.
  17. Finite fields. Number 20. Cambridge university press, 1997.
  18. Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages. In Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II, pages 344–374. Springer, 2021.
  19. Improved bound on the local leakage-resilience of shamir’s secret sharing. In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2678–2683. IEEE, 2022.
  20. Marko J Moisio. The moments of a kloosterman sum and the weight distribution of a Zetterberg-type binary cyclic code. IEEE transactions on information theory, 53(2):843–847, 2007.
  21. Lower bounds for leakage-resilient secret sharing. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 556–577. Springer, 2020.
  22. Weil sums over small subgroups. arXiv preprint arXiv:2211.07739, 2022.
  23. Repair optimal erasure codes through Hadamard designs. IEEE Transactions on Information Theory, 59(5):3021–3037, 2013.
  24. Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Transactions on Information Theory, 57(8):5227–5239, 2011.
  25. Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
  26. A repair framework for scalar MDS codes. IEEE Journal on Selected Areas in Communications, 32(5):998–1007, 2014.
  27. Zigzag codes: MDS array codes with optimal rebuilding. IEEE Transactions on Information Theory, 59(3):1597–1616, 2012.
  28. Optimal repair of Reed-Solomon codes: Achieving the cut-set bound. In 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), pages 216–227. IEEE, 2017.
  29. Explicit minimum storage regenerating codes. IEEE Transactions on Information Theory, 62(8):4466–4480, 2016.
  30. Explicit constructions of high-rate MDS array codes with optimal repair bandwidth. IEEE Transactions on Information Theory, 63(4):2001–2014, 2017.
  31. Explicit constructions of optimal-access MDS codes with nearly optimal sub-packetization. IEEE Transactions on Information Theory, 63(10):6307–6317, 2017.
  32. Victor A Zinoviev. On classical kloosterman sums. Cryptography and Communications, 11:461–496, 2019.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com