A proactive secret sharing scheme based on Chinese remainder theorem

被引:8
作者
Meng, Keju [1 ]
Miao, Fuyou [1 ]
Ning, Yu [1 ]
Huang, Wenchao [1 ]
Xiong, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
proactive secret sharing; Chinese remainder theorem; polynomial ring; integer ring; isomorphism;
D O I
10.1007/s11704-019-9123-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders' shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
引用
收藏
页数:10
相关论文
共 31 条
[1]  
[Anonymous], 1991, INPROC 11 ANN INT CR, DOI [10.1007/3-540-46766-1_9, DOI 10.1007/3-540-46766-1_9, DOI 10.1007/3--540-46766-1_9]
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]  
Baron Joshua, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P23, DOI 10.1007/978-3-319-28166-7_2
[4]  
BLAKLEY G, 1979, AFIPS 1979 NAT COMP, P313, DOI 10.1109/MARK.1979.8817296
[5]  
Cachin C, 2008, . U.S. Patent, Patent No. [7, 389, 416, 7389416]
[6]  
Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
[7]   A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure [J].
Dehkordi, Massoud Hadian ;
Mashhadi, Samaneh ;
Oraei, Hossein .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) :491-503
[8]  
Feldman P., 1987, 28th Annual Symposium on Foundations of Computer Science (Cat. No.87CH2471-1), P427, DOI 10.1109/SFCS.1987.4
[9]  
Feng B., 2015, IJ NETW SECUR, V17, P123
[10]   GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05) :307-313