A proactive secret sharing scheme based on Chinese remainder theorem

被引:0
作者
Keju Meng
Fuyou Miao
Yu Ning
Wenchao Huang
Yan Xiong
Chin-Chen Chang
机构
[1] University of Science and Technology of China,School of Computer Science and Technology
[2] Feng Chia University,Department of Information Engineering and Computer Science
[3] Hangzhou Dianzi University,School of Computer Science and Technology
来源
Frontiers of Computer Science | 2021年 / 15卷
关键词
proactive secret sharing; Chinese remainder theorem; polynomial ring; integer ring; isomorphism;
D O I
暂无
中图分类号
学科分类号
摘要
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders’ shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
引用
收藏
相关论文
共 43 条
[1]  
Shamir A(1979)How to share a secret Communications of the ACM 22 612-613
[2]  
Harn L(2010)Authenticated group key transfer protocol based on secret sharing IEEE Transactions on Computers 59 842-846
[3]  
Lin C(2011)Identity-based key distribution for mobile Ad Hoc networks Frontiers of Computer Science 5 442-447
[4]  
Lv X(1994)Group-oriented ( IEE Proceedings-Computers and Digital Techniques 141 307-313
[5]  
Li H(2004)) threshold digital signature scheme and digital multisignature Journal of Information and Computational Science 1 259-262
[6]  
Wang B(2015)Simple secret sharing and threshold RSA signature schemes Journal of Cryptology 28 49-109
[7]  
Harn L(2015)Efficient asynchronous verifiable secret sharing and multiparty computation Frontiers of Computer Science 9 778-787
[8]  
Tang S(2019)The optimal information rate for graph access structures of nine participants Information Sciences 473 13-30
[9]  
Patra A(1981)A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem Communications of the ACM 24 583-584
[10]  
Choudhury A(1983)On sharing secrets and Reed-Solomon codes IEEE Transactions on Information Theory 29 208-210