@inproceedings{a7c7f3d300a542f0b3d75c31107d2c38,
title = "Threshold Changeable Ramp Secret Sharing",
abstract = "Threshold changeable secret sharing studies the problem of changing the thresholds of a secret sharing scheme after the shares of the initial scheme have been distributed to players. We focus on the most studied scenario of dealer-free threshold increase in the absence of secure channels with an outsider adversary. Previous theoretical works in this scenario only consider an unchanged privacy threshold and define optimal threshold changeable secret sharing schemes as ones meeting the bounds in this case. We highlight increasing the privacy threshold as an independent design goal on top of increasing the reconstruction threshold. We prove new bounds for the above threshold increase scenario with respect to a new privacy threshold that is possibly bigger than the initial privacy threshold. We similarly define an optimal threshold changeable secret sharing scheme as one that achieves equality in all these bounds. A trade-off between the new privacy threshold and the required combiner communication complexity is discovered and new optimal schemes for the case when privacy threshold also increases are identified. These theoretical results put our new construction of threshold changeable secret sharing on a firm ground. Our threshold changeable ramp scheme does not need a priori knowledge of the targeted thresholds to design the protocol and allow the conversion into a ramp scheme with arbitrary new reconstruction thresholds while the privacy threshold grows proportionally as the reconstruction threshold grows. Previous such schemes were only known from lattice-based constructions that use a non-standard privacy definition. Our new schemes are statistical secret sharing schemes that guarantee indistinguishability of shares up to the new privacy threshold.",
keywords = "Communication efficient secret sharing, Threshold changeable secret sharing",
author = "Fuchun Lin and San Ling and Huaxiong Wang and Neng Zeng",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Switzerland AG.; 18th International Conference on Cryptology and Network Security, CANS 2019 ; Conference date: 25-10-2019 Through 27-10-2019",
year = "2019",
doi = "10.1007/978-3-030-31578-8_17",
language = "English",
isbn = "9783030315771",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "308--327",
editor = "Yi Mu and Xinyi Huang and Deng, {Robert H.}",
booktitle = "Cryptology and Network Security - 18th International Conference, CANS 2019, Proceedings",
}