How to Share Secret Efficiently over Networks

被引:10
|
作者
Harn, Lein [1 ]
Hsu, Ching-Fang [2 ]
Xia, Zhe [3 ,4 ]
Zhou, Junwei [3 ,4 ]
机构
[1] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[2] Cent China Normal Univ, Comp Sch, Wuhan 430079, Hubei, Peoples R China
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Hubei, Peoples R China
[4] Wuhan Univ Technol, Hubei Key Lab Transportat Internet Things, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
SIGNATURE SCHEME; THRESHOLD;
D O I
10.1155/2017/5437403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protocol may make the secret-sharing schemes significantly more complicated. To solve this problem, we introduce a new type of secret-sharing, called protected secret-sharing (PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret but also can be used to establish the shared keys between every pair of shareholders. Therefore, in the secret reconstruction phase, the recovered secret is only available to shareholders but not to nonshareholders. In this paper, an information theoretically secure PSS scheme is proposed, its security properties are analyzed, and its computational complexity is evaluated. Moreover, our proposed PSS scheme also can be applied to threshold cryptosystems to prevent nonshareholders from learning the output of the protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [2] HOW TO SHARE A SECRET
    MIGNOTTE, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 371 - 375
  • [3] How to share a quantum secret
    Cleve, R
    Gottesman, D
    Lo, HK
    [J]. PHYSICAL REVIEW LETTERS, 1999, 83 (03) : 648 - 651
  • [4] HOW TO (REALLY) SHARE A SECRET
    SIMMONS, GJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 390 - 448
  • [5] How to Share a Secret, Infinitely
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 485 - 514
  • [6] How to Share a Secret, Infinitely
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4179 - 4190
  • [7] HOW TO SHARE A SECRET WITH CHEATERS
    TOMPA, M
    WOLL, H
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 261 - 265
  • [8] How to share a cake with a secret agent
    Cheze, Guillaume
    [J]. MATHEMATICAL SOCIAL SCIENCES, 2019, 100 : 13 - 15
  • [9] How to Best Share a Big Secret
    Shor, Roman
    Yadgar, Gala
    Huang, Wentao
    Yaakobi, Eitan
    Bruck, Jehoshua
    [J]. SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 76 - 88
  • [10] Secret signatures: How to achieve business privacy efficiently?
    Lee, Byoungcheon
    Choo, Kim-Kwang Raymond
    Yang, Jeongmo
    Yoo, Seungjae
    [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 30 - +