A CRT-based verifiable secret sharing scheme secure against unbounded adversaries

被引:9
作者
Ersoy, Oguzhan [1 ,2 ]
Pedersen, Thomas Brochmann [1 ]
Kaya, Kamer [3 ]
Selcuk, Ali Aydin [4 ]
Anarim, Emin [2 ]
机构
[1] TUBITAK BILGEM, Kocaeli, Turkey
[2] Bogazici Univ, Elect & Elect Engn Dept, Istanbul, Turkey
[3] Sabanci Univ, Fac Engn & Nat Sci, Istanbul, Turkey
[4] TOBB Univ Econ & Technol, Dept Comp Engn, Ankara, Turkey
关键词
verifiable secret sharing; Chinese Remainder Theorem; Asmuth-Bloom; statistically hiding commitments; joint random secret sharing; MULTIPARTY COMPUTATION;
D O I
10.1002/sec.1617
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret or when the secret domain is small enough for a brute-force attack by a powerful adversary. Unfortunately, all the Chinese Remainder Theorem-based verifiable secret sharing schemes in the literature are either insecure or suffer from the vulnerability of computationally hiding commitments. To the best of our knowledge, there exist five such studies where two of them were already proven to be insecure. In this work, we first show that two of the remaining schemes are also insecure, that is, the schemes reveal information on the secret even when the adversary is passive. In addition, the remaining one is only secure against a computationally bounded adversary which can be a problem for secret sharing schemes requiring long-term secret obscurity or using small secret domain. We propose a modification for the latter scheme and prove that the modified scheme is a secure verifiable secret sharing scheme against an unbounded adversary. Lastly, as an application, we show how to use the new scheme for joint random secret sharing and analyze the practicality and efficiency of the proposed schemes. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4416 / 4427
页数:12
相关论文
共 31 条
[1]  
[Anonymous], 2013095 CRYPT EPRINT
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]  
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[6]  
Caldwell Chris K., 2000, PREPRINT
[7]  
Cao ZJ, 2007, LECT NOTES COMPUT SC, V4681, P230
[8]   A distributed secret share update scheme with public verifiability for ad hoc network [J].
Chen Zhenhua ;
Li Shundong ;
Wu Qianhong ;
Huang Qiong .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1485-1493
[9]  
Chor B, 1985, 2013 IEEE 54 ANN S F, P383
[10]  
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316