Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory

被引:0
作者
Yang, Ze [1 ]
Tian, Youliang [1 ,2 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Guizhou Univ, Inst Cryptog & Data Secur, Guiyang 550025, Peoples R China
来源
2021 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA | 2021年
基金
中国国家自然科学基金;
关键词
(t; n)-threshold secret sharing scheme; authorized shares t; average mutual information; channel capacity; capability limitation;
D O I
10.1109/NaNA53684.2021.00017
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
At present, the research on shares in the t-out-of-n secret sharing scheme mainly focuses on the delimitation of share length, and there is no specific quantitative method for the security of authorized shares t in secret sharing without considering any application scenarios. In this paper, we presents a method to quantify the capabilities of the attacker and the defender under the t-out-of-n secret sharing scheme. More specifically, we present a new general notion of limitation to provide a precise bound of attack and defense capability under the (t, n)-threshold sharing scheme. Furthermore, we discuss the best selection of authorized shares t. Firstly, we transform the attack and defense under the (t, n)-threshold secret sharing scheme into the communication problem in information theory, and establish the attack channel and defense channel from the point of view of the attacker and the defender. Moreover, we describe the capability of both attacking and defending by introducing average mutual information, and analyze the limitation of the capability of both sides, as well as the maximum value of the average mutual information is the channel capacity. Finally, according to the average amount of mutual information of the change curve under different scenarios of secret sharing, we compare and analyze the influence of the capability limitation of the attacker and the defender on the value of t, and get the best selection of t.
引用
收藏
页码:52 / 58
页数:7
相关论文
共 19 条
[1]   Better Secret Sharing via Robust Conditional Disclosure of Secrets [J].
Applebaum, Benny ;
Beimel, Amos ;
Nir, Oded ;
Peter, Naty .
PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20), 2020, :280-293
[2]   Secret-Sharing Schemes for General and Uniform Access Structures [J].
Applebaum, Benny ;
Beimel, Amos ;
Farras, Oriol ;
Nir, Oded ;
Peter, Naty .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 :441-471
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   Revisiting Non-Malleable Secret Sharing [J].
Badrinarayanan, Saikrishna ;
Srinivasan, Akshayaram .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 :593-622
[5]  
Blakley GR, 1984, LECT NOTES COMPUTER, P242, DOI DOI 10.1007/3-540-39568-7_20
[6]   Function Secret Sharing [J].
Boyle, Elette ;
Gilboa, Niv ;
Ishai, Yuval .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :337-367
[7]   An incentive-compatible rational secret sharing scheme using blockchain and smart contract [J].
Chen, Zerui ;
Tian, Youliang ;
Peng, Changgen .
SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (10)
[8]  
Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64
[9]  
Chung KM, 2010, LECT NOTES COMPUT SC, V6223, P483, DOI 10.1007/978-3-642-14623-7_26
[10]   Ideal Hierarchical Secret Sharing Schemes [J].
Farras, Oriol ;
Padro, Carles .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (05) :3273-3286