Secret sharing schemes for dense forbidden graphs

Amos Beimel, Oriol Farràs, Naty Peter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

A secret-sharing scheme realizes a given graph if every two vertices connected by an edge can reconstruct the secret and every independent set in the graph does not get any information about the secret. A secret-sharing scheme realizes a forbidden graph if every two vertices connected by an edge can reconstruct the secret and every two vertices which are not connected by an edge do not get any information about the secret. Similar to secret-sharing schemes for general access structures, there are gaps between the known lower bounds and upper bounds on the total share size for graphs and for forbidden graphs. Following [Beimel et al. CRYPTO 2012], our goal in this paper is to understand how the total share size increases by removing few edges from a graph that can be realized by an efficient secret-sharing scheme. We show that if a graph with n vertices contains at least (Formula Presented) edges for some (Formula Presented), i.e., it is obtained by removing few edges from the complete graph, then there is a scheme realizing its forbidden graph in which the total share size is O(n7/6+2β/3). This should be compared to O(n3/2), the best known upper bound for the total share size in general forbidden graphs. Additionally, we show that a forbidden graph access structure obtained by removing few edges from an arbitrary graph G can be realized by a secret-sharing scheme with total share size of O(m+ n7/6+2β/3), where m is the total size of the shares in a secretsharing scheme realizing G and n1+β is the number of the removed edges. We also show that for a graph obtained by removing few edges from an arbitrary graph G with n vertices, if the chromatic number of the graph that contains the removed edges is small, then there is a fairly efficient scheme realizing the resulting graph; specifically, we construct a secret-sharing scheme with total share size of Õ(m2/3n2/3+2β/3c1/3), where m is the total size of the shares in a secret-sharing scheme realizing G, the value n1+β is an upper bound on the number of the removed edges, and c is the chromatic number of the graph of the removed edges. This should be compared to O(n2/ log(n)), the best known upper bound for the total share size for general graphs.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings
EditorsRoberto De Prisco, Vassilis Zikas
PublisherSpringer Verlag
Pages509-528
Number of pages20
ISBN (Print)9783319446172
DOIs
StatePublished - 1 Jan 2016
Event10th International Conference on Security and Cryptography for Networks, SCN 2016 - Amalfi, Italy
Duration: 31 Aug 20162 Sep 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9841 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Security and Cryptography for Networks, SCN 2016
Country/TerritoryItaly
CityAmalfi
Period31/08/162/09/16

Keywords

  • Avoiding covers
  • Covers by graphs
  • Secret sharing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Secret sharing schemes for dense forbidden graphs'. Together they form a unique fingerprint.

Cite this