Secret Sharing Schemes with Hidden Sets

被引:0
|
作者
de Souza, Rick Lopes [1 ]
Vigil, Martin [1 ]
Custodio, Ricardo [1 ]
Caullery, Florian [2 ]
Moura, Lucia [3 ]
Panario, Daniel [4 ]
机构
[1] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[2] DarkMatter LLC, Abu Dhabi, U Arab Emirates
[3] Univ Ottawa, Ottawa, ON, Canada
[4] Carleton Univ, Ottawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
NUMBER;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that at least t shares are needed to reconstruct k, where 0 < t <= n. Nothing about the secret can be learned from less than t shares. To split secret k, the Dealer generates a polynomial f, whose independent term is k and the coefficients are randomly selected using a uniform distribution. A share is a pair (x; f (x)) where x is also chosen randomly using a uniform distribution. This scheme is useful, for example, to distribute cryptographic keys among different cloud providers and to create multi-factor authentication. The security of Shamir's Secret Sharing Scheme is usually analyzed using a threat model where the Dealer is trusted to split and share secrets as described above. In this paper, we demonstrate that there exists a different threat model where a malicious Dealer can compute shares such that a subset of less than t shares is allowed to reconstruct the secret. We refer to such subsets as hidden sets. We formally define hidden sets and prove lower bounds on the number of possible hidden sets for polynomials of degree t - 1. Yet, we show how to detect hidden sets given a set of n shares and describe how to create hidden sets while sharing a secret using a modification of Shamir's scheme.
引用
收藏
页码:718 / 723
页数:6
相关论文
共 50 条
  • [21] Strongly ideal secret sharing schemes
    Phillips, Steven J.
    Phillips, Nicholas C.
    Journal of Cryptology, 1992, 5 (03) : 185 - 191
  • [22] On the information rate of secret sharing schemes
    Blundo, C
    DeSantis, A
    Gargano, L
    Vaccaro, U
    THEORETICAL COMPUTER SCIENCE, 1996, 154 (02) : 283 - 306
  • [23] Ideal Hierarchical Secret Sharing Schemes
    Farras, Oriol
    Padro, Carles
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 219 - 236
  • [24] On the information rate of secret sharing schemes
    Universita di Salerno, Baronissi, Italy
    Theor Comput Sci, 2 (283-306):
  • [25] Ideal Multipartite Secret Sharing Schemes
    Farras, Oriol
    Marti-Farre, Jaume
    Padro, Carles
    JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 434 - 463
  • [26] Probability of shares in secret sharing schemes
    Dipto. di Info. Ed Applicazioni, Univ. di Salerno, 84081 , Baronissi, Italy
    Inf Process Lett, 5-6 (169-175):
  • [27] On the Optimization of Bipartite Secret Sharing Schemes
    Farras, Oriol
    Metcalf-Burton, Jessica Ruth
    Padro, Carles
    Vazquez, Leonor
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 93 - +
  • [28] Reusing shares in secret sharing schemes
    Zheng, Yuliang, 1600, (37):
  • [29] Combinatorial interpretation of secret sharing schemes
    Kurosawa, K
    Okada, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 55 - 64
  • [30] On multiplicative linear secret sharing schemes
    Nikov, V
    Nikova, S
    Preneel, B
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 135 - 147