Security limitations of Shamir's secret sharing

被引:1
|
作者
Lemnouar, Noui [1 ,2 ]
机构
[1] Univ Batna2, Fac Math & Comp Sci, Dept Math, Batna 05000, Algeria
[2] Univ Batna2, Lamie Lab, Batna 05000, Algeria
关键词
Elliptic curve; Perfect scheme; RSA cryptosystem; Secret; Shamir's secret sharing; Threshold; ATTACKS; SCHEME; RSA;
D O I
10.1080/09720529.2021.1961902
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The security is so important for both storing and transmitting the digital data, the choice of parameters is critical for a security system, that is, a weak parameter will make the scheme very vulnerable to attacks, for example the use of supersingular curves or anomalous curves leads to weaknesses in elliptic curve cryptosystems, for RSA cryptosystem there are some attacks for low public exponent or small private exponent. In certain circumstances the secret sharing scheme is required to decentralize the risk. In the context of the security of secret sharing schemes, it is known that for the scheme of Shamir, an unqualified set of shares cannot leak any information about the secret. This paper aims to show that the well-known Shamir's secret sharing is not always perfect and that the uniform randomization before sharing is insufficient to obtain a secure scheme. The second purpose of this paper is to give an explicit construction of weak polynomials for which the Shamir's (k, n) threshold scheme is insecure in the sense that there exist a fewer than k shares which can reconstruct the secret. Particular attention is given to the scheme whose threshold is less than or equal to 6. It also showed that for certain threshold k, the secret can be calculated by a pair of shares with the probability of 1/2. Finally, in order to address the mentioned vulnerabilities, several classes of polynomials should be avoided.
引用
收藏
页码:977 / 989
页数:13
相关论文
共 50 条
  • [1] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [2] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [3] Faulty share detection in Shamir's secret sharing
    Uteshev, A. Yu
    Marov, A., V
    [J]. VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2019, 15 (02): : 274 - 282
  • [4] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [5] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [6] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme
    Pundkar, Sumedh N.
    Shekokar, Narendra
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
  • [7] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [8] Shamir's Secret Sharing for Authentication without Reconstructing Password
    Gupta, Kishor Datta
    Rahman, Md Lutfar
    Dasgupta, Dipankar
    Poudyal, Subash
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 958 - 963
  • [9] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [10] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848