A collaborative secret sharing scheme based on the Chinese Remainder Theorem

被引:9
作者
Jia, Xingxing [1 ]
Song, Yixuan [1 ]
Wang, Daoshun [2 ]
Nie, Daxin [1 ]
Wu, Jinzhao [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou 730000, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing 100084, Peoples R China
[3] Guangxi Univ Nationalities, Sch Software, Guangxi 530006, Peoples R China
关键词
group collaboration; collaborative secret sharing; Chinese Remainder Theorem; secret sharing; ENCRYPTION;
D O I
10.3934/mbe.2019062
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret sharing (SS) can be used as an important group key management technique for distributed cloud storage and cloud computing. In a traditional threshold SS scheme, a secret is shared among a number of participants and each participant receives one share. In many real-world applications, some participants are involved in multiple SS schemes with group collaboration supports thus have more privileges than the others. To address this issue, we could assign multiple shares to such participants. However, this is not a bandwidth efficient solution. Therefore, a more sophisticated mechanism is required. In this paper, we propose an efficient collaborative secret sharing (CSS) scheme specially tailored for multi-privilege participants in group collaboration. The CSS scheme between two or among more SS schemes is constructed by rearranging multi-privilege participants in each participant set and then formulated into several independent SS schemes with multi-privilege shares that precludes information leakage. Our scheme is based on the Chinese Remainder Theorem with lower recovery complexity and it allows each multi-privilege participant to keep only one share. It can be formally proved that our scheme achieves asymptotically perfect security. The experimental results demonstrate that it is efficient to achieve group collaboration, and it has computational advantages, compared with the existing works in the literature.
引用
收藏
页码:1280 / 1299
页数:20
相关论文
共 33 条
[1]  
Agrawal D., 2011, SECURE DATA MANAGEME, P57
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   A scheme for threshold multi-secret sharing [J].
Chan, CW ;
Chang, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :1-14
[5]  
Ding C., 1996, Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography
[6]   On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme [J].
Dragan, Constantin Catalin ;
Tiplea, Ferucio Laurentiu .
INFORMATION SCIENCES, 2018, 463 :75-85
[7]   Distributive weighted threshold secret sharing schemes [J].
Dragan, Constantin Catalin ;
Tiplea, Ferucio Laurentiu .
INFORMATION SCIENCES, 2016, 339 :85-97
[8]   Chinese remaindering with errors [J].
Goldreich, O ;
Ron, D ;
Sudan, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1330-1338
[9]   Realizing secret sharing with general access structure [J].
Harn, Lein ;
Hsu, Chingfang ;
Zhang, Mingwu ;
He, Tingting ;
Zhang, Maoyuan .
INFORMATION SCIENCES, 2016, 367 :209-220
[10]   Multilevel threshold secret sharing based on the Chinese Remainder Theorem [J].
Harn, Lein ;
Miao Fuyou .
INFORMATION PROCESSING LETTERS, 2014, 114 (09) :504-509