Overcoming security limitations of Secret Share techniques: the Nested Secret Share

被引:8
作者
Galletta, Antonino [1 ,2 ]
Taheri, Javid [2 ]
Fazio, Maria [1 ]
Celesti, Antonio [1 ]
Villari, Massimo [1 ]
机构
[1] Univ Messina, MIFT Dept, Messina, Italy
[2] Univ Karlstad, Comp Sci Dept, Karlstad, Sweden
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Secret Share; Nested Secret Share; Security; Distributed Storage; Data Availability;
D O I
10.1109/TrustCom53373.2021.00054
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed. Therefore, if a minimum number of peers collude then attackers can recompose the secret easily. A possible approach to improve the security of SS is designing nest fragment sharing techniques. In this paper, we propose the Nested Secret Share (NSS) as a more reliable and scalable strategy. In particular, we discuss the security of NSS considering the number of recomposition attempts that an attacker has to perform to retrieve the secret and then we deeply analyse the impact of the redundancy and the number of peers on the secret management against the percentage of compromised nodes. Experiments were promising and showed that the redundancy degree of SS can be highly improved by NSS.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 27 条
[1]  
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[2]   Towards Hybrid Multi-Cloud Storage Systems: Understanding How to Perform Data Transfer [J].
Celesti, Antonio ;
Galletta, Antonino ;
Fazio, Maria ;
Villari, Massimo .
BIG DATA RESEARCH, 2019, 16 :1-17
[3]  
Chattopadhyay AK, 2018, 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P1025, DOI 10.1109/UEMCON.2018.8796568
[4]  
Cungui Liang, 2019, 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), P2628, DOI 10.1109/IAEAC47372.2019.8998001
[5]  
Dautrich JL, 2012, LECT NOTES COMPUT SC, V7371, P145, DOI 10.1007/978-3-642-31540-4_12
[6]  
Di Crescenzo G, 2001, LECT NOTES COMPUT SC, V2136, P292
[7]   Study on Secret Sharing for SM2 Digital Signature and Its Application [J].
Ding, Fan ;
Long, Yihong ;
Wu, Peili .
2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, :205-209
[8]   On the Applicability of Secret Share Algorithms for Saving Data on IoT, Edge and Cloud Devices [J].
Galletta, Antonino ;
Taheri, Javid ;
Villari, Massimo .
2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, :14-21
[9]   Big MRI Data Dissemination and Retrieval in a Multi-Cloud Hospital Storage System [J].
Galletta, Antonino ;
Celesti, Antonio ;
Tusa, Francesco ;
Fazio, Maria ;
Bramanti, Placido ;
Villari, Massimo .
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (DH'17), 2017, :162-166
[10]  
Galletta A, 2017, IEEE SYMP COMP COMMU, P94, DOI 10.1109/ISCC.2017.8024511