TY - JOUR
T1 - Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR
AU - Eriguchi, Reo
AU - Kunihiro, Noboru
AU - Nuida, Koji
N1 - Funding Information:
Manuscript received March 2, 2022. Manuscript revised July 15, 2022. Manuscript publicized September 13, 2022. †The author is with The University of Tokyo, Tokyo, 113-8654 Japan. ††The author is with University of Tsukuba, Tsukuba-shi, 305-8573 Japan. †††The author is with Kyushu University, Fukuoka-shi, 819-0395 Japan. ∗Presently, with National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan. ∗∗This paper is presented in part at International Symposium on Information Theory and Its Applications (ISITA), 2020 [1]. This research was partially supported by JST CREST Grant Number JPMJCR2113, Japan and JSPS KAKENHI Grant Numbers JP20J20797 and JP19K22838. This research was in part conducted under a contract of “Research and development on new generation cryptography for secure wireless communication services” among “Research and Development for Expansion of Radio Wave Resources (JPJ000254),” which was supported by the Ministry of Internal Affairs and Communications, Japan. a) E-mail: reo-eriguchi@g.ecc.u-tokyo.ac.jp DOI: 10.1587/transfun.2022CIP0001
Publisher Copyright:
© 2023 The Institute of Electronics.
PY - 2023/3
Y1 - 2023/3
N2 - Ramp secret sharing is a variant of secret sharing which can achieve better information ratio than perfect schemes by allowing some partial information on a secret to leak out. Strongly secure ramp schemes can control the amount of leaked information on the components of a secret. In this paper, we reduce the construction of strongly secure ramp secret sharing for general access structures to a linear algebraic problem. As a result, we show that previous results on strongly secure network coding imply two linear transformation methods to make a given linear ramp scheme strongly secure. They are explicit or provide a deterministic algorithm while the previous methods which work for any linear ramp scheme are non-constructive. In addition, we present a novel application of strongly secure ramp schemes to symmetric PIR in a multi-user setting. Our solution is advantageous over those based on a non-strongly secure scheme in that it reduces the amount of communication between users and servers and also the amount of correlated randomness that servers generate in the setup.
AB - Ramp secret sharing is a variant of secret sharing which can achieve better information ratio than perfect schemes by allowing some partial information on a secret to leak out. Strongly secure ramp schemes can control the amount of leaked information on the components of a secret. In this paper, we reduce the construction of strongly secure ramp secret sharing for general access structures to a linear algebraic problem. As a result, we show that previous results on strongly secure network coding imply two linear transformation methods to make a given linear ramp scheme strongly secure. They are explicit or provide a deterministic algorithm while the previous methods which work for any linear ramp scheme are non-constructive. In addition, we present a novel application of strongly secure ramp schemes to symmetric PIR in a multi-user setting. Our solution is advantageous over those based on a non-strongly secure scheme in that it reduces the amount of communication between users and servers and also the amount of correlated randomness that servers generate in the setup.
UR - http://www.scopus.com/inward/record.url?scp=85150443872&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85150443872&partnerID=8YFLogxK
U2 - 10.1587/transfun.2022CIP0001
DO - 10.1587/transfun.2022CIP0001
M3 - Article
AN - SCOPUS:85150443872
SN - 0916-8508
VL - 106 EA
SP - 263
EP - 271
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 3
ER -