Overcoming security limitations of Secret Share techniques: the Nested Secret Share

被引:8
作者
Galletta, Antonino [1 ,2 ]
Taheri, Javid [2 ]
Fazio, Maria [1 ]
Celesti, Antonio [1 ]
Villari, Massimo [1 ]
机构
[1] Univ Messina, MIFT Dept, Messina, Italy
[2] Univ Karlstad, Comp Sci Dept, Karlstad, Sweden
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Secret Share; Nested Secret Share; Security; Distributed Storage; Data Availability;
D O I
10.1109/TrustCom53373.2021.00054
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed. Therefore, if a minimum number of peers collude then attackers can recompose the secret easily. A possible approach to improve the security of SS is designing nest fragment sharing techniques. In this paper, we propose the Nested Secret Share (NSS) as a more reliable and scalable strategy. In particular, we discuss the security of NSS considering the number of recomposition attempts that an attacker has to perform to retrieve the secret and then we deeply analyse the impact of the redundancy and the number of peers on the secret management against the percentage of compromised nodes. Experiments were promising and showed that the redundancy degree of SS can be highly improved by NSS.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 27 条
[21]   A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing [J].
Pang, LJ ;
Wang, YM .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) :840-848
[22]  
Patil SD, 2018, PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P1238, DOI 10.1109/ICICCT.2018.8473200
[23]  
Prasetyo H, 2018, 2018 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), P181, DOI 10.1109/IC3INA.2018.8629513
[24]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[25]   Implementing Secret Sharing Scheme in Parallel [J].
Shyu, Shyong Jian ;
Tsai, Ying Zhen ;
Tsai, Yin Te .
2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, :362-365
[26]  
Tan LD, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), P961, DOI 10.1109/ICIVC.2018.8492724
[27]  
Venkataramanachary V, 2020, INT CONF COMMUN SYST, DOI [10.1109/comsnets48256.2020.9027494, 10.1109/COMSNETS48256.2020.9027494]