## Abstract

Evolving secret-sharing schemes, introduced by Komargodski, Naor, and Yogev (TCC 2016b), are secret-sharing schemes in which there is no a-priory upper bound on the number of parties that will participate. The parties arrive one by one and when a party arrives the dealer gives it a share; the dealer cannot update this share when other parties arrive. Motivated by the fact that when the number of parties is known, ramp secret-sharing schemes are more efficient than threshold secret-sharing schemes, we study evolving ramp secret-sharing schemes. Specifically, we study evolving (b(j), g(j))-ramp secret-sharing schemes, where (Formula presented) are non-decreasing functions. In such schemes, any set of parties that for some j contains g(j) parties from the first parties that arrive can reconstruct the secret, and any set such that for every j contains less than b(j) parties from the first j parties that arrive cannot learn any information about the secret. We focus on the case that the gap is small, namely (Formula presented) for (Formula presented). We show that there is an evolving ramp secret-sharing scheme with gap (Formula presented), in which the share size of the j-th party is (Formula presented). Furthermore, we show that our construction results in much better share size for fixed values of β, i.e., there is an evolving ramp secret-sharing scheme with gap (Formula presented), in which the share size of the j-th party is (Formula presented). Our construction should be compared to the best known evolving g(j)-threshold secret-sharing schemes (i.e., when(Formula presented) in which the share size of the j-th party is O(j^{4}. Thus, our construction offers a significant improvement for every constant β, showing that allowing a gap between the sizes of the authorized and unauthorized sets can reduce the share size. In addition, we present an evolving (k/2, k)-ramp secret-sharing scheme for a constant k (which can be very big), where any set of parties of size at least k can reconstruct the secret and any set of parties of size at most k/2 cannot learn any information about the secret. The share size of the j-th party in our construction is O(log k log j). This is an improvement over the best known evolving k-threshold secret-sharing schemes in which the share size of the j-th party is O(klog j).

Original language | English |
---|---|

Title of host publication | Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings |

Editors | Anne Canteaut, Yuval Ishai |

Publisher | Springer |

Pages | 529-555 |

Number of pages | 27 |

ISBN (Print) | 9783030457204 |

DOIs | |

State | Published - 1 Jan 2020 |

Event | 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020 - Zagreb, Croatia Duration: 10 May 2020 → 14 May 2020 |

### Publication series

Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|

Volume | 12105 LNCS |

ISSN (Print) | 0302-9743 |

ISSN (Electronic) | 1611-3349 |

### Conference

Conference | 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020 |
---|---|

Country/Territory | Croatia |

City | Zagreb |

Period | 10/05/20 → 14/05/20 |

## ASJC Scopus subject areas

- Theoretical Computer Science
- Computer Science (all)