Infinite probabilistic secret sharing

Laszlo Csirmaz

Kybernetika (2023)

  • Volume: 59, Issue: 2, page 179-197
  • ISSN: 0023-5954

Abstract

top
A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions. The study of schemes using arbitrary probability spaces and unbounded number of participants allows us to investigate their abstract properties, to connect the topic to other branches of mathematics, and to discover new design paradigms. A scheme is perfect if unqualified subsets have no information on the secret, that is, their total share is independent of the secret. By relaxing this security requirement, three other scheme types are defined. Our first result is that every (infinite) access structure can be realized by a perfect scheme where the recovery functions are non-measurable. The construction is based on a paradoxical pair of independent random variables which determine each other. Restricting the recovery functions to be measurable ones, we give a complete characterization of access structures realizable by each type of the schemes. In addition, either a vector-space or a Hilbert-space based scheme is constructed realizing the access structure. While the former one uses the traditional uniform distributions, the latter one uses Gaussian distributions, leading to a new design paradigm.

How to cite

top

Csirmaz, Laszlo. "Infinite probabilistic secret sharing." Kybernetika 59.2 (2023): 179-197. <http://eudml.org/doc/299081>.

@article{Csirmaz2023,
abstract = {A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions. The study of schemes using arbitrary probability spaces and unbounded number of participants allows us to investigate their abstract properties, to connect the topic to other branches of mathematics, and to discover new design paradigms. A scheme is perfect if unqualified subsets have no information on the secret, that is, their total share is independent of the secret. By relaxing this security requirement, three other scheme types are defined. Our first result is that every (infinite) access structure can be realized by a perfect scheme where the recovery functions are non-measurable. The construction is based on a paradoxical pair of independent random variables which determine each other. Restricting the recovery functions to be measurable ones, we give a complete characterization of access structures realizable by each type of the schemes. In addition, either a vector-space or a Hilbert-space based scheme is constructed realizing the access structure. While the former one uses the traditional uniform distributions, the latter one uses Gaussian distributions, leading to a new design paradigm.},
author = {Csirmaz, Laszlo},
journal = {Kybernetika},
keywords = {secret sharing; abstract probability space; Sierpinski topology; product measure; span program; Hilbert space program},
language = {eng},
number = {2},
pages = {179-197},
publisher = {Institute of Information Theory and Automation AS CR},
title = {Infinite probabilistic secret sharing},
url = {http://eudml.org/doc/299081},
volume = {59},
year = {2023},
}

TY - JOUR
AU - Csirmaz, Laszlo
TI - Infinite probabilistic secret sharing
JO - Kybernetika
PY - 2023
PB - Institute of Information Theory and Automation AS CR
VL - 59
IS - 2
SP - 179
EP - 197
AB - A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions. The study of schemes using arbitrary probability spaces and unbounded number of participants allows us to investigate their abstract properties, to connect the topic to other branches of mathematics, and to discover new design paradigms. A scheme is perfect if unqualified subsets have no information on the secret, that is, their total share is independent of the secret. By relaxing this security requirement, three other scheme types are defined. Our first result is that every (infinite) access structure can be realized by a perfect scheme where the recovery functions are non-measurable. The construction is based on a paradoxical pair of independent random variables which determine each other. Restricting the recovery functions to be measurable ones, we give a complete characterization of access structures realizable by each type of the schemes. In addition, either a vector-space or a Hilbert-space based scheme is constructed realizing the access structure. While the former one uses the traditional uniform distributions, the latter one uses Gaussian distributions, leading to a new design paradigm.
LA - eng
KW - secret sharing; abstract probability space; Sierpinski topology; product measure; span program; Hilbert space program
UR - http://eudml.org/doc/299081
ER -

References

top
  1. Azema, J., Yor, M., Meyer, F., Rue, R. de la, , In: Séminaire de Probabilités XXVII, volume 1557 of Lecture Notes in Mathematics, pages Springer Berlin - Heidelberg 1993, pp. 15-21. MR1308547DOI
  2. Beimel, A., Secret-sharing schemes: A survey., In: IWCC (Y.-M. Chee, Z. Guo, S. Ling, F. Shao, Y. Tang, H. Wang, and Ch. Xing, eds.), volume 6639 of Lecture Notes in Computer Science, Springer 2011, pp 11-46. MR2834691
  3. Blakley, G. R., Swanson, L., , In: CRYPTO 1982, pp. 39-50. DOI
  4. Chang, J. T., Pollard, D. D., , Statistica Neerlandica 51 (1997), 3, 287-317. MR1484954DOI
  5. Chor, B., Kushilevitz, E., , J. Cryptology 6 (1993), 2, 97-86. MR1229234DOI
  6. Dibert, A., Generalized Secret Sharing., Master's Thesis, Central European University, Budapest 2011. 
  7. Dibert, A., Csirmaz, I., , J. Math. Cryptology 8 (2014), 2, 141-168. MR3213579DOI
  8. Eggleston, H. G., , Quater. J. Math. Oxford 5 (1954), 108-115. MR0064850DOI
  9. Fremlin, D. H., Measure Theory, Volume 2., Torres Fremlin, Colchester 2003. MR2462280
  10. Haezendonck, J., Abstract Lebesgue-Rokhlin spaces., Bull. Soc. Math. Belgique 25 (1973), 243-258. MR0335733
  11. Janson, S., Gaussian Hilbert Spaces., Cambridge Tracts in Mathematics. Cambridge University Press, 1997. MR1474726
  12. Kallenberg, O., Foundations of Modern Probability., Probability and Its Applications Series. Springer, 2010. Zbl0996.60001MR1464694
  13. Karchmer, M., Wigderson, A., On span programs., In: Structure in Complexity Theory Conference 1993, pp. 102-111. MR1310791
  14. Makar, B. H., , Cryptologia 4 (1980), 4, 230-237. MR0583776DOI
  15. Patarin, J., Transfinite cryptography., IJUC 8 (2012), 11-72. 
  16. Phan, R., Vaudenay, S., , In: Coding and Cryptology (Y. Chee, Ch. Li, S. Ling, H. Wang, and Ch. Xing, eds.), volume 5557 of Lecture Notes in Computer Science, Springer, Berlin-Heidelberg 2009, pp. 202-218. MR2836242DOI
  17. Rokhlin, V. A., On the fundamental ideas of measure theory., Trans. Amer. Math. Soc. 10 (1962), 1-54. MR0047744
  18. Tao, T., , Amer. Math. Soc., Graduate Studies Math. 126 (2011), 206 pp. MR2827917DOI
  19. Watson, S., , Topology Appl. 35 (1990), 2-3, 299-302. MR1058809DOI

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.