108
S ECRET S HARING S CHEMES FOR V ERY DENSE GRAPHS AMOS BEIMEL 1 ORIOL FARRÀS 2 YUVAL MINTZ 1 1 Ben-Gurion University of the Negev, Israel 2 Universitat Rovira i Virgili, Spain CRYPTO 2012

Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

SECRET SHARING SCHEMES

FOR

VERY DENSE GRAPHS

AMOS BEIMEL1 ORIOL FARRÀS 2 YUVAL MINTZ1

1Ben-Gurion University of the Negev, Israel2Universitat Rovira i Virgili, Spain

CRYPTO 2012

Page 2: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Program

1 Introduction to Secret Sharing

2 Graph Secret Sharing

3 Our Results

Page 3: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

1 Introduction to Secret Sharing

2 Graph Secret Sharing

3 Our Results

Page 4: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

Page 5: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

Secret

P1 P2 P3 P4 P5

Page 6: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

Secret

P1 P2 P3 P4 P5

s1 s2 s3 s4 s5

Page 7: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

P1 P2 P3 P4 P5

Page 8: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

P1 P2 P3 P4 P5

Secret

Authorized subset

Page 9: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

P1 P2 P3 P4 P5

NoInformation

Forbidden subset

Page 10: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Scheme

A method to protect a secret

P1 P2 P3 P4 P5

Access structure: Family of authorized subsets

Page 11: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Schemes: Overview

Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87).

Page 12: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Schemes: Overview

Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87).

Unconditionally secure.

Page 13: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Schemes: Overview

Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87).

Unconditionally secure.

Perfect schemes: subsets not in the access structure areforbidden.

Page 14: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Schemes: Overview

Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87).

Unconditionally secure.

Perfect schemes: subsets not in the access structure areforbidden.

Cryptographic primitive with many applications

Multiparty computation

Threshold cryptography

Access control

Attribute-based encryption

Oblivious transfer

...

Page 15: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Secret Sharing Schemes: Overview

Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87).

Unconditionally secure.

Perfect schemes: subsets not in the access structure areforbidden.

Cryptographic primitive with many applications

Multiparty computation

Threshold cryptography

Access control

Attribute-based encryption

Oblivious transfer

...

Need of efficient schemes: Shares have to be small.

Page 16: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

Page 17: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.

Page 18: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Page 19: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Schemes with total share size n are called ideal.

Page 20: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Schemes with total share size n are called ideal.

... but which is the most efficient scheme for an access structure?

Page 21: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Schemes with total share size n are called ideal.

... but which is the most efficient scheme for an access structure?

There are methods to construct schemes for every access structure...(Benaloh and Leichter’88, Simmons et al’91, Brickell’89, Karchmer and Wigderson’93)

Page 22: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Schemes with total share size n are called ideal.

... but which is the most efficient scheme for an access structure?

There are methods to construct schemes for every access structure...(Benaloh and Leichter’88, Simmons et al’91, Brickell’89, Karchmer and Wigderson’93)

but in general are innefficient.

Page 23: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size

As a measure of efficiency we use

total share size:sum size of shares

size of secret=

log |Si |log |S|

There exist efficient schemes for certain access structures.e.g., threshold a.s. with n participants admits schemes with t.s.s. n(Shamir’79, Blakley’79).

Schemes with total share size n are called ideal.

... but which is the most efficient scheme for an access structure?

There are methods to construct schemes for every access structure...(Benaloh and Leichter’88, Simmons et al’91, Brickell’89, Karchmer and Wigderson’93)

but in general are innefficient.

For most access structures, the t.s.s of these schemes is 2O(n).

Page 24: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size (II)

In general, the best upper bound on the t.s.s of the best scheme for

an access structure is 2O(n).

Page 25: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size (II)

In general, the best upper bound on the t.s.s of the best scheme for

an access structure is 2O(n).

Lower Bounds:

There is a family of access structures for which the t.s.s. of anyscheme is

Ω(n2/ log n)(Csirmaz’97)

This is the best known lower bound for sharing a secret with respectto an access structure.

Page 26: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

On the Share Size (II)

In general, the best upper bound on the t.s.s of the best scheme for

an access structure is 2O(n).

Lower Bounds:

There is a family of access structures for which the t.s.s. of anyscheme is

Ω(n2/ log n)(Csirmaz’97)

This is the best known lower bound for sharing a secret with respectto an access structure.

Open Problem: BRIDGE THIS HUGE GAP

Page 27: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Results

Open Problem: BRIDGE THE GAP

Page 28: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Results

Open Problem: BRIDGE THE GAP

Open problem: Which access structures are HARD?i.e. which access structures require large shares to be realized?

Page 29: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Results

Open Problem: BRIDGE THE GAP

Open problem: Which access structures are HARD?i.e. which access structures require large shares to be realized?

We study these problems for GRAPH ACCESS STRUCTURES.

Page 30: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Results

Open Problem: BRIDGE THE GAP

Open problem: Which access structures are HARD?i.e. which access structures require large shares to be realized?

We study these problems for GRAPH ACCESS STRUCTURES.

We find new UPPER AND LOWER BOUNDS for the t.s.s.

Page 31: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Results

Open Problem: BRIDGE THE GAP

Open problem: Which access structures are HARD?i.e. which access structures require large shares to be realized?

We study these problems for GRAPH ACCESS STRUCTURES.

We find new UPPER AND LOWER BOUNDS for the t.s.s.

We extend the techniques for finding upper bounds to

homogeneous access structures

the general case

Page 32: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

1 Introduction to Secret Sharing

2 Graph Secret Sharing

3 Our Results

Page 33: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing

1

2

3

4

5

6

An access structure is agraph access structure if theminimal authorized subsetsare of size two.It defines a graph.

Page 34: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing

1

2

3

4

5

6

An access structure is agraph access structure if theminimal authorized subsetsare of size two.It defines a graph.

1

2A set is authorized ifcontains an edge:

1, 2

Page 35: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing

1

2

3

4

5

6

An access structure is agraph access structure if theminimal authorized subsetsare of size two.It defines a graph.

1

6

5

A set is forbidden if doesnot contain any edge:

1, 5, 6

Page 36: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing

1

2

3

4

5

6

An access structure is agraph access structure if theminimal authorized subsetsare of size two.It defines a graph.

A graph secret sharingscheme is a scheme withgraph access structure.

Page 37: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

Page 38: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Page 39: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Page 40: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

Page 41: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

Page 42: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

1 2

34

Simple construction for anygraph:

The secret s is sharedindependently for every edge.

The total share size is 2m,where m is the number ofedges.

Page 43: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

1 2

34

Simple construction for anygraph:

The secret s is sharedindependently for every edge.

The total share size is 2m,where m is the number ofedges.

r1

s + r1

Page 44: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

1 2

34

Simple construction for anygraph:

The secret s is sharedindependently for every edge.

The total share size is 2m,where m is the number ofedges.

r2 s + r2

Page 45: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

1 2

34

Simple construction for anygraph:

The secret s is sharedindependently for every edge.

The total share size is 2m,where m is the number ofedges.

r3

s + r3

Page 46: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graph Secret Sharing: Previous Results

Graph secret sharing schemes:

All minimal authorized subsets are of size two.

Simple but interesting case.

Studied in many previous works.

First step for obtaining general results.

1 2

34

Simple construction for anygraph:

The secret s is sharedindependently for every edge.

The total share size is 2m,where m is the number ofedges.

r4

s + r4

Page 47: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graphs with Ideal Schemes

1 2

3

45

6Clique:It defines threshold accessstructure of threshold 2.

Page 48: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Graphs with Ideal Schemes

1 2

3

45

6Clique:It defines threshold accessstructure of threshold 2.

Complete Bipartite Graph

1

2

3

4

5

6

1 2

3

45

6 7

Star

Page 49: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

Page 50: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

Page 51: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)

Page 52: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Page 53: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Lower bounds:

Page 54: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Lower bounds:

There exists a family of access structures for which the totalshare size of the schemes realizing them is Ω(n log n)

Page 55: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Lower bounds:

There exists a family of access structures for which the totalshare size of the schemes realizing them is Ω(n log n)(van Dijk’95, Blundo et al.’97, Csirmaz’05).

Page 56: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Lower bounds:

There exists a family of access structures for which the totalshare size of the schemes realizing them is Ω(n log n)(van Dijk’95, Blundo et al.’97, Csirmaz’05).

There exists a family of access structures for which the totalshare size of the linear schemes realizing them is Ω(n3/2)

Page 57: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Bounds on the Total Share Size

The total share size of the best scheme realizing a graph accessstructure is upper bounded by

O(m), where m is the number of edges

O(n2/ log n)(Bublitz’86, Blundo et al.’96, Erdös and Pyber’97)

Lower bounds:

There exists a family of access structures for which the totalshare size of the schemes realizing them is Ω(n log n)(van Dijk’95, Blundo et al.’97, Csirmaz’05).

There exists a family of access structures for which the totalshare size of the linear schemes realizing them is Ω(n3/2)(Beimel et al.’97).

Page 58: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

Page 59: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

Page 60: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Page 61: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Since the total share size is upper bounded by O(n2/ log n), we try tosolve the following question:

Page 62: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Since the total share size is upper bounded by O(n2/ log n), we try tosolve the following question:

Is there any graph with total share size Ω(n2/polylogn)?

Page 63: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Since the total share size is upper bounded by O(n2/ log n), we try tosolve the following question:

Is there any graph with total share size Ω(n2/polylogn)?

Since every graph admits a scheme with total share size 2m, in ahard graph m has to be big.

Page 64: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Since the total share size is upper bounded by O(n2/ log n), we try tosolve the following question:

Is there any graph with total share size Ω(n2/polylogn)?

Since every graph admits a scheme with total share size 2m, in ahard graph m has to be big.

We study VERY DENSE GRAPHS

Page 65: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Motivation of Our Work

To BRIDGE THE GAP between upper and lower bounds on the totalshare size for graph access structures.

We look for EFFICIENT constructions for graphs.

We look for HARD GRAPHS

Since the total share size is upper bounded by O(n2/ log n), we try tosolve the following question:

Is there any graph with total share size Ω(n2/polylogn)?

Since every graph admits a scheme with total share size 2m, in ahard graph m has to be big.

We study VERY DENSE GRAPHS

i.e. graphs with(n

2

)

− ℓ edges, with ℓ "small".

Page 66: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

1 Introduction to Secret Sharing

2 Graph Secret Sharing

3 Our Results

Page 67: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4 log n).

Page 68: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n · n1/4+3β/4 log n).

Page 69: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Page 70: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Direct consequences:

Page 71: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Direct consequences:

Is there any very dense graph with total share sizeΩ(n2/polylogn)?

Page 72: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Direct consequences:

Is there any very dense graph with total share sizeΩ(n2/polylogn)? the answer is NO.

Page 73: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Direct consequences:

Is there any very dense graph with total share sizeΩ(n2/polylogn)? the answer is NO.

in a hard graph, both m and(n

2

)

− m must be big.

Page 74: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, thenit admits a scheme with total share size

O(n5/4+3β/4).

Direct consequences:

Is there any very dense graph with total share sizeΩ(n2/polylogn)? the answer is NO.

in a hard graph, both m and(n

2

)

− m must be big.

Main techniques:

Coverings by "easy" graphs: cliques, bipartite graphs and stars.

The probabilistic method.

Colorings of graphs. skip details

Page 75: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (II): Using Coverings

We cover the graph G by using easy graphs:cliques, complete bipartite graphs, and stars.

Page 76: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (II): Using Coverings

We cover the graph G by using easy graphs:cliques, complete bipartite graphs, and stars.

1 2

3

45

6 =

Page 77: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (II): Using Coverings

We cover the graph G by using easy graphs:cliques, complete bipartite graphs, and stars.

1 2

3

45

6 =

1 2

3

45

6 +

1 2

3

45

6

Page 78: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (II): Using Coverings

We cover the graph G by using easy graphs:cliques, complete bipartite graphs, and stars.

1 2

3

45

6 =

1 2

3

45

6 +

1 2

3

45

6

The scheme for G consists on sharing the secret independently forevery piece of the covering.

Page 79: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (II): Using Coverings

We cover the graph G by using easy graphs:cliques, complete bipartite graphs, and stars.

1 2

3

45

6 =

1 2

3

45

6 +

1 2

3

45

6

The scheme for G consists on sharing the secret independently forevery piece of the covering.

We look for small coverings in order to obtain efficient schemes.

Page 80: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (III): A New Technique

We describe the graph G as a clique minus the excluded graph G′

Page 81: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (III): A New Technique

We describe the graph G as a clique minus the excluded graph G′

1 2

3

45

6 =

1 2

3

45

6 −

1 2

3

45

6

Page 82: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (III): A New Technique

We describe the graph G as a clique minus the excluded graph G′

1 2

3

45

6 =

1 2

3

45

6 −

1 2

3

45

6

Each coloring of G′ yields to a subgraph of G.

Page 83: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (III): A New Technique

We describe the graph G as a clique minus the excluded graph G′

1 2

3

45

6 =

1 2

3

45

6 −

1 2

3

45

6

Each coloring of G′ yields to a subgraph of G.

1 2

3

45

6

1 2

3

4

5

6

Page 84: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (III): A New Technique

We describe the graph G as a clique minus the excluded graph G′

1 2

3

45

6 =

1 2

3

45

6 −

1 2

3

45

6

Each coloring of G′ yields to a subgraph of G.

1 2

3

45

6

1 2

3

4

5

6

Taking many random colorings of G′ we end with a covering of G.

Page 85: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (IV): Corollaries

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, then it admits ascheme with total share size

O(n5/4+3β/4).

Page 86: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (IV): Corollaries

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, then it admits ascheme with total share size

O(n5/4+3β/4).

Corollary

If β < 1/3, then it admits a scheme with t.s.s. o(n3/2).

Page 87: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (IV): Corollaries

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, then it admits ascheme with total share size

O(n5/4+3β/4).

Corollary

If β < 1/3, then it admits a scheme with t.s.s. o(n3/2).

Corollary

If a graph has(n

2

)

− ℓ edges,

Page 88: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (IV): Corollaries

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, then it admits ascheme with total share size

O(n5/4+3β/4).

Corollary

If β < 1/3, then it admits a scheme with t.s.s. o(n3/2).

Corollary

If a graph has(n

2

)

− ℓ edges,

and ℓ < n/2, then it admits a scheme with t.s.s. n + O(ℓ5/4).

Page 89: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Our Main Result (IV): Corollaries

Theorem

If a graph has(n

2

)

− n1+β edges for some 0 < β < 1, then it admits ascheme with total share size

O(n5/4+3β/4).

Corollary

If β < 1/3, then it admits a scheme with t.s.s. o(n3/2).

Corollary

If a graph has(n

2

)

− ℓ edges,

and ℓ < n/2, then it admits a scheme with t.s.s. n + O(ℓ5/4).

and ℓ ≪ n4/5, then it admits a scheme with t.s.s. n + o(n).

Page 90: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

Page 91: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

If we add ℓ edges to G, by using the trivial construction we canconstruct a scheme for the new graph with total share size r + 2ℓ.

Page 92: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

If we add ℓ edges to G, by using the trivial construction we canconstruct a scheme for the new graph with total share size r + 2ℓ.

But what happens if we delete edges from G? .

Page 93: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

If we add ℓ edges to G, by using the trivial construction we canconstruct a scheme for the new graph with total share size r + 2ℓ.

But what happens if we delete edges from G? NOT KNOWN.

Page 94: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

If we add ℓ edges to G, by using the trivial construction we canconstruct a scheme for the new graph with total share size r + 2ℓ.

But what happens if we delete edges from G? NOT KNOWN.

Theorem

If we delete ℓ edges from G, the new graph admits a scheme withtotal share size

O(√ℓnr) if ℓ > r/n

r + 2ℓn if ℓ ≤ r/n

Page 95: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets

Let G be a graph. Let Σ be a scheme of t.s.s. r realizing G.

If we add ℓ edges to G, by using the trivial construction we canconstruct a scheme for the new graph with total share size r + 2ℓ.

But what happens if we delete edges from G? NOT KNOWN.

Theorem

If we delete ℓ edges from G, the new graph admits a scheme withtotal share size

O(√ℓnr) if ℓ > r/n

r + 2ℓn if ℓ ≤ r/n

Direct consequence: If G admits an efficient scheme, the graphs thatare close to G are not hard.

Page 96: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets: Generalization

We extend the techniques for graph access structures to

homogeneous access structures

general access structures

go to details

Page 97: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets: Generalization

We extend the techniques for graph access structures to

homogeneous access structures

general access structures

We provide new techniques and constructions, and we give answersto the following problems:

go to details

Page 98: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets: Generalization

We extend the techniques for graph access structures to

homogeneous access structures

general access structures

We provide new techniques and constructions, and we give answersto the following problems:

Deleting minimal authorized subsets in a threshold accessstructure.

go to details

Page 99: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Deleting Minimal Authorized Subsets: Generalization

We extend the techniques for graph access structures to

homogeneous access structures

general access structures

We provide new techniques and constructions, and we give answersto the following problems:

Deleting minimal authorized subsets in a threshold accessstructure.

Deleting minimal authorized subsets in any access structure.

go to details

Page 100: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Lower Bounds

Theorem

For every 2 < ℓ < n, there exists a family of graphs with(n

2

)

− ℓ edgeswhose schemes have t.s.s. at least n + ℓ.

Page 101: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Lower Bounds

Theorem

For every 2 < ℓ < n, there exists a family of graphs with(n

2

)

− ℓ edgeswhose schemes have t.s.s. at least n + ℓ.

There exists a scheme with t.s.s. n + O(ℓ5/4), when 1 < ℓ < n/2.

Page 102: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Lower Bounds

Theorem

For every 2 < ℓ < n, there exists a family of graphs with(n

2

)

− ℓ edgeswhose schemes have t.s.s. at least n + ℓ.

There exists a scheme with t.s.s. n + O(ℓ5/4), when 1 < ℓ < n/2.

Theorem

For every 0 < β < 1, there exists a family of graphs with(n

2

)

− n1+β

edges whose schemes have at least t.s.s. Ω(βn log n).

Page 103: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Lower Bounds

Theorem

For every 2 < ℓ < n, there exists a family of graphs with(n

2

)

− ℓ edgeswhose schemes have t.s.s. at least n + ℓ.

There exists a scheme with t.s.s. n + O(ℓ5/4), when 1 < ℓ < n/2.

Theorem

For every 0 < β < 1, there exists a family of graphs with(n

2

)

− n1+β

edges whose schemes have at least t.s.s. Ω(βn log n).

Theorem

For every 0 < β < 1, there exists a family of graphs with(n

2

)

− n1+β

edges whose linear schemes have at least t.s.s. Ω(n1+β/2).

Page 104: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Lower Bounds

Theorem

For every 2 < ℓ < n, there exists a family of graphs with(n

2

)

− ℓ edgeswhose schemes have t.s.s. at least n + ℓ.

There exists a scheme with t.s.s. n + O(ℓ5/4), when 1 < ℓ < n/2.

Theorem

For every 0 < β < 1, there exists a family of graphs with(n

2

)

− n1+β

edges whose schemes have at least t.s.s. Ω(βn log n).

Theorem

For every 0 < β < 1, there exists a family of graphs with(n

2

)

− n1+β

edges whose linear schemes have at least t.s.s. Ω(n1+β/2).

There exists a scheme with t.s.s. O(n5/4+3β/4) = O(n1+β/2 ·n1/4+β/4).

Page 105: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Summary and Open Directions

Summary:

Secret sharing for very dense graphs.

New upper and lower bounds for the total share size for theschemes realizing these graphs.

Does exit any hard very dense graph?: No.

New techniques for the construction of secret sharing schemes.

Extension to homogeneous and general access structures.

Page 106: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Summary and Open Directions

Summary:

Secret sharing for very dense graphs.

New upper and lower bounds for the total share size for theschemes realizing these graphs.

Does exit any hard very dense graph?: No.

New techniques for the construction of secret sharing schemes.

Extension to homogeneous and general access structures.

Open directions:

To find hard graphs.

New techniques for finding lower bounds on the total share size.

To bridge the gap between upper and lower bounds on the totalshare size.

Page 107: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

THANK YOU

Page 108: Secret Sharing Schemes for Very Dense Graphs€¦ · Secret Sharing Schemes: Overview Shamir (’79), Blakley (’79), Ito, Saito, and Nishizeki (’87). Unconditionally secure. Perfect

Appendix: Deleting Minimal Authorized Subsets

Theorem

Let Γ be a t-threshold access structures for a constant t. If we deleteℓ minimal authorized subsets, then the resulting access structureadmits a scheme with total share size

O(ℓn).

Let Γ be an access structure with a scheme of t.s.s. r such that

if A ∈ min Γ, then |A| ≤ k for some constant k .

Let Γ′ be an access structure such that

min Γ′ = min Γ \∆for every p ∈ P, there is at most d subsets in ∆ containing p.

Theorem

The access structure Γ′ admits a scheme with total share size

O(dk−1r).

go back