About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Research Article

Replicated Additive Secret Sharing with the Optimized Number of Shares

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-25538-0_20,
        author={Juanjuan Guo and Mengjie Shuai and Qiongxiao Wang and Wenyuan Li and Jingqiang Lin},
        title={Replicated Additive Secret Sharing with the Optimized Number of Shares},
        proceedings={Security and Privacy in Communication Networks. 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
        proceedings_a={SECURECOMM},
        year={2023},
        month={2},
        keywords={Secret sharing Replicated additive secret sharing Secure multiparty computation Data privacy},
        doi={10.1007/978-3-031-25538-0_20}
    }
    
  • Juanjuan Guo
    Mengjie Shuai
    Qiongxiao Wang
    Wenyuan Li
    Jingqiang Lin
    Year: 2023
    Replicated Additive Secret Sharing with the Optimized Number of Shares
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-25538-0_20
Juanjuan Guo1, Mengjie Shuai1, Qiongxiao Wang1, Wenyuan Li1, Jingqiang Lin2,*
  • 1: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
  • 2: School of Cyber Security, University of Science and Technology of China, Hefei
*Contact email: linjq@ustc.edu.cn

Abstract

Replicated additive secret sharing (RSS) schemes introduce the threshold for additive secret sharing, and are known for computational efficiency and flexibility. While the traditional RSS schemes usually have a huge storage overhead with each server holding multiple shares, recent variations have tried reducing storage overhead but at the expense of computational performance. In this work, we focus on optimizing the number of shares to reduce storage overhead without introducing excessive computational cost. First, we construct a 2-of-nRSS (i.e., any two amongnservers could reconstruct the secret value), which generates secret shares incrementally so that the storage increases almost linearly withn, and achieves the optimal number of shares as we proved. Then, we extend 2-of-nRSS to a generalt-of-nRSS. Moreover, the incrementally-generate mechanism makes our scheme support a server to join dynamically that refrain existing shares from being modified. Our empirical study across 60 servers supports that our scheme largely reduces the storage overhead while obtaining an efficient runtime. Storage efficiency shows an improvement of up to two orders of magnitude and online runtime is within microsecond scale in our experimental settings.

Keywords
Secret sharing Replicated additive secret sharing Secure multiparty computation Data privacy
Published
2023-02-04
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-25538-0_20
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL