Secret Sharing with Certified Deletion (2405.08117v1)
Abstract: Secret sharing allows a user to split a secret into many shares so that the secret can be recovered if, and only if, an authorized set of shares is collected. Although secret sharing typically does not require any computational hardness assumptions, its security does require that an adversary cannot collect an authorized set of shares. Over long periods of time where an adversary can benefit from multiple data breaches, this may become an unrealistic assumption. We initiate the systematic study of secret sharing with certified deletion in order to achieve security even against an adversary that eventually collects an authorized set of shares. In secret sharing with certified deletion, a (classical) secret is split into quantum shares which can be verifiably destroyed. We define two natural notions of security: no-signaling security and adaptive security. Next, we show how to construct (i) a secret sharing scheme with no-signaling certified deletion for any monotone access structure, and (ii) a threshold secret sharing scheme with adaptive certified deletion. Our first construction uses Bartusek and Khurana's (CRYPTO 2023) 2-out-of-2 secret sharing scheme with certified deletion as a building block, while our second construction is built from scratch and requires several new technical ideas. For example, we significantly generalize the ``XOR extractor'' of Agarwal, Bartusek, Khurana, and Kumar (EUROCRYPT 2023) in order to obtain high rate seedless extraction from certain quantum sources of entropy.
- Secret-sharing schemes for general and uniform access structures. In Yuval Ishai and Vincent Rijmen, editors, EUROCRYPT 2019, Part III, volume 11478 of LNCS, pages 441–471. Springer, Heidelberg, May 2019.
- A new framework for quantum oblivious transfer. In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part I, volume 14004 of LNCS, pages 363–394. Springer, Heidelberg, April 2023.
- Amos Beimel. Secret-sharing schemes: A survey. In Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, and Chaoping Xing, editors, Coding and Cryptology, pages 11–46, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
- Sampling in a quantum population, and applications. In Tal Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 724–741. Springer, Heidelberg, August 2010.
- Software with certified deletion. In Eurocrypt 2024 (to appear), 2024.
- Quantum encryption with certified deletion. In Rafael Pass and Krzysztof Pietrzak, editors, TCC 2020, Part III, volume 12552 of LNCS, pages 92–122. Springer, Heidelberg, November 2020.
- Cryptography with certified deletion. In Helena Handschuh and Anna Lysyanskaya, editors, CRYPTO 2023, Part V, volume 14085 of LNCS, pages 192–223. Springer, Heidelberg, August 2023.
- Weakening assumptions for publicly-verifiable deletion. In Guy Rothblum and Hoeteck Wee, editors, Theory of Cryptography, pages 183–197, Cham, 2023. Springer Nature Switzerland.
- Publicly-verifiable deletion via target-collapsing functions. In Helena Handschuh and Anna Lysyanskaya, editors, CRYPTO 2023, Part V, volume 14085 of LNCS, pages 99–128. Springer, Heidelberg, August 2023.
- Generalized secret sharing and monotone functions. In Shafi Goldwasser, editor, CRYPTO’88, volume 403 of LNCS, pages 27–35. Springer, Heidelberg, August 1990.
- G. R. Blakley. Safeguarding cryptographic keys. 1979 International Workshop on Managing Requirements Knowledge (MARK), pages 313–318, 1979.
- Threshold cryptosystems. In Gilles Brassard, editor, CRYPTO’89, volume 435 of LNCS, pages 307–315. Springer, Heidelberg, August 1990.
- Improving the security of quantum protocols via commit-and-open. In Shai Halevi, editor, CRYPTO 2009, volume 5677 of LNCS, pages 408–427. Springer, Heidelberg, August 2009.
- Shuhong Gao. A New Algorithm for Decoding Reed-Solomon Codes, pages 55–68. Springer US, Boston, MA, 2003.
- Certified everlasting secure collusion-resistant functional encryption, and more. In Eurocrypt 2024 (to appear), 2024.
- Quantum encryption with certified deletion, revisited: Public key, attribute-based, and classical communication. In Mehdi Tibouchi and Huaxiong Wang, editors, ASIACRYPT 2021, Part I, volume 13090 of LNCS, pages 606–636. Springer, Heidelberg, December 2021.
- Certified everlasting zero-knowledge proof for QMA. In Yevgeniy Dodis and Thomas Shrimpton, editors, CRYPTO 2022, Part I, volume 13507 of LNCS, pages 239–268. Springer, Heidelberg, August 2022.
- Wassily Hoeffding. Probability Inequalities for sums of Bounded Random Variables, pages 409–426. Springer New York, New York, NY, 1994.
- Secret sharing schemes realizing general access structure. In Proc. IEEE Global Telecommunication Conf. (Globecom’87), pages 99–102, 1987.
- Publicly verifiable deletion from minimal assumptions. In Guy N. Rothblum and Hoeteck Wee, editors, Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part IV, volume 14372 of Lecture Notes in Computer Science, pages 228–245. Springer, 2023.
- Lectures on Elementary Mathematics. Open Court Publishing Company, 1901.
- Breaking the circuit-size barrier in secret sharing. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, page 699–708, New York, NY, USA, 2018. Association for Computing Machinery.
- Alexander Poremba. Quantum Proofs of Deletion for Learning with Errors. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), volume 251 of Leibniz International Proceedings in Informatics (LIPIcs), pages 90:1–90:14, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik.
- Universally composable privacy amplification against quantum adversaries. In Joe Kilian, editor, TCC 2005, volume 3378 of LNCS, pages 407–425. Springer, Heidelberg, February 2005.
- I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
- Adi Shamir. How to share a secret. Communications of the Association for Computing Machinery, 22(11):612–613, November 1979.
- Error correction for algebraic block codes, December 30 1986. US Patent 4,633,470.
- Andreas J. Winter. Coding theorem and strong converse for quantum channels. IEEE Trans. Inf. Theory, 45(7):2481–2485, 1999.