Repairing Reed-Solomon Codes over Prime Fields via Exponential Sums (2402.02358v1)
Abstract: This paper presents two repair schemes for low-rate Reed-Solomon (RS) codes over prime fields that can repair any node by downloading a constant number of bits from each surviving node. The total bandwidth resulting from these schemes is greater than that incurred during trivial repair; however, this is particularly relevant in the context of leakage-resilient secret sharing. In that framework, our results provide attacks showing that $k$-out-of-$n$ Shamir's Secret Sharing over prime fields for small $k$ is not leakage-resilient, even when the parties leak only a constant number of bits. To the best of our knowledge, these are the first such attacks. Our results are derived from a novel connection between exponential sums and the repair of RS codes. Specifically, we establish that non-trivial bounds on certain exponential sums imply the existence of explicit nonlinear repair schemes for RS codes over prime fields.
- On the local leakage resilience of linear secret sharing schemes. Journal of Cryptology, 34(2):1–65, 2021.
- An improved mordell type bound for exponential sums. Proceedings of the American Mathematical Society, 133(2):313–320, 2005.
- Nonlinear repair of reed-solomon codes. IEEE Transactions on Information Theory, 68(8):5165–5177, 2022.
- Network coding for distributed storage systems. IEEE transactions on information theory, 56(9):4539–4551, 2010.
- Practical considerations in repairing reed-solomon codes. arXiv preprint arXiv:2205.11015, 2022.
- Fractional repetition codes for repair in distributed storage systems. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 1510–1517. IEEE, 2010.
- Data secrecy in distributed storage systems under exact repair. In 2013 International Symposium on Network Coding (NetCod), pages 1–6. IEEE, 2013.
- Minimum storage regenerating codes for all parameters. IEEE Transactions on Information Theory, 63(10):6318–6328, 2017.
- Repairing Reed-Solomon codes. IEEE transactions on Information Theory, 63(9):5684–5698, 2017.
- DR Heath-Brown. Arithmetic applications of Kloosterman sums. Nieuw Archief voor Wiskunde, 1:380–384, 2000.
- On z4-linear Goethals codes and Kloosterman sums. Designs, Codes and Cryptography, 17(1):269–288, 1999.
- Analytic number theory, volume 53. American Mathematical Soc., 2021.
- New extension of the weil bound for character sums with applications to coding. In 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pages 788–796. IEEE, 2011.
- New bounds on the local leakage resilience of shamir’s secret sharing scheme. Cryptology ePrint Archive, 2023.
- HD Kloosterman. On the representation of numbers in the formax 2+ by 2+ cz 2+ dt 2. Acta mathematica, 49(3):407–464, 1927.
- Maxim Aleksandrovich Korolev. Karatsuba’s method for estimating kloosterman sums. Sbornik: Mathematics, 207(8):1142, 2016.
- Finite fields. Number 20. Cambridge university press, 1997.
- Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages. In Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II, pages 344–374. Springer, 2021.
- Improved bound on the local leakage-resilience of shamir’s secret sharing. In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2678–2683. IEEE, 2022.
- Marko J Moisio. The moments of a kloosterman sum and the weight distribution of a Zetterberg-type binary cyclic code. IEEE transactions on information theory, 53(2):843–847, 2007.
- Lower bounds for leakage-resilient secret sharing. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 556–577. Springer, 2020.
- Weil sums over small subgroups. arXiv preprint arXiv:2211.07739, 2022.
- Repair optimal erasure codes through Hadamard designs. IEEE Transactions on Information Theory, 59(5):3021–3037, 2013.
- Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Transactions on Information Theory, 57(8):5227–5239, 2011.
- Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
- A repair framework for scalar MDS codes. IEEE Journal on Selected Areas in Communications, 32(5):998–1007, 2014.
- Zigzag codes: MDS array codes with optimal rebuilding. IEEE Transactions on Information Theory, 59(3):1597–1616, 2012.
- Optimal repair of Reed-Solomon codes: Achieving the cut-set bound. In 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), pages 216–227. IEEE, 2017.
- Explicit minimum storage regenerating codes. IEEE Transactions on Information Theory, 62(8):4466–4480, 2016.
- Explicit constructions of high-rate MDS array codes with optimal repair bandwidth. IEEE Transactions on Information Theory, 63(4):2001–2014, 2017.
- Explicit constructions of optimal-access MDS codes with nearly optimal sub-packetization. IEEE Transactions on Information Theory, 63(10):6307–6317, 2017.
- Victor A Zinoviev. On classical kloosterman sums. Cryptography and Communications, 11:461–496, 2019.