(t,p)-Threshold Point Function Secret Sharing Scheme Based on Polynomial Interpolation and Its Application

Point function secret sharing(PFSS)was a special kind of function secret sharing(FSS)that was a special case of secret sharing, that the shared secret was a point function instead of a value. Motivated by the reason that the PFSS has very good application in the secure multi-party computations by investigating, and the existing PFSS scheme without threshold and inefficient. A new (t, p)–PFSS scheme based on polynomial interpolation was proposed, and this PFSS scheme is secure and efficient by analyzing the correctness, the security and the efficiency of the scheme, and is the first threshold PFSS scheme. Then an example was given to demonstrate scheme has effectiveness. Lastly, we respectively construct a (t, p)–threshold multi-server PIR and secure keyword search protocol, and a (t, p)–threshold incremental secret sharing protocol, both based on the proposed (t, p)–PFSS scheme, and simple analysis the correctness and the security of the first protocol.

[1]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  References , 1971 .

[3]  Yuval Ishai,et al.  Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[4]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[5]  Rafail Ostrovsky,et al.  Private information storage (extended abstract) , 1997, STOC '97.

[6]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[7]  Yuval Ishai,et al.  Function Secret Sharing , 2015, EUROCRYPT.

[8]  Rafail Ostrovsky,et al.  Private Information Storage , 1996, IACR Cryptol. ePrint Arch..

[9]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[10]  Mark Zhandry,et al.  Cutting-Edge Cryptography Through the Lens of Secret Sharing , 2018, TCC.

[11]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Yuval Ishai,et al.  General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..

[14]  Yuval Ishai,et al.  Distributed Point Functions and Their Applications , 2014, EUROCRYPT.

[15]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[16]  Rafail Ostrovsky,et al.  Private Searching on Streaming Data , 2005, CRYPTO.