Secret Sharing Schemes with Hidden Sets

被引:0
|
作者
de Souza, Rick Lopes [1 ]
Vigil, Martin [1 ]
Custodio, Ricardo [1 ]
Caullery, Florian [2 ]
Moura, Lucia [3 ]
Panario, Daniel [4 ]
机构
[1] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[2] DarkMatter LLC, Abu Dhabi, U Arab Emirates
[3] Univ Ottawa, Ottawa, ON, Canada
[4] Carleton Univ, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
NUMBER;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that at least t shares are needed to reconstruct k, where 0 < t <= n. Nothing about the secret can be learned from less than t shares. To split secret k, the Dealer generates a polynomial f, whose independent term is k and the coefficients are randomly selected using a uniform distribution. A share is a pair (x; f (x)) where x is also chosen randomly using a uniform distribution. This scheme is useful, for example, to distribute cryptographic keys among different cloud providers and to create multi-factor authentication. The security of Shamir's Secret Sharing Scheme is usually analyzed using a threat model where the Dealer is trusted to split and share secrets as described above. In this paper, we demonstrate that there exists a different threat model where a malicious Dealer can compute shares such that a subset of less than t shares is allowed to reconstruct the secret. We refer to such subsets as hidden sets. We formally define hidden sets and prove lower bounds on the number of possible hidden sets for polynomials of degree t - 1. Yet, we show how to detect hidden sets given a set of n shares and describe how to create hidden sets while sharing a secret using a modification of Shamir's scheme.
引用
收藏
页码:718 / 723
页数:6
相关论文
共 50 条
  • [1] A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes
    Mike J. Grannell
    Terry S. Griggs
    Anne Penfold Street
    Designs, Codes and Cryptography, 2006, 40 : 225 - 236
  • [2] A flaw in the use of minimal defining sets for secret sharing schemes
    Grannell, Mike J.
    Griggs, Terry S.
    Penfold Street, Anne
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 40 (02) : 225 - 236
  • [3] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [4] Secret sharing schemes for infinite sets of participants: A new design technique
    D'Arco, Paolo
    De Prisco, Roberto
    De Santis, Alfredo
    THEORETICAL COMPUTER SCIENCE, 2021, 859 : 149 - 161
  • [5] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [6] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [7] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [8] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [9] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [10] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385