A proactive secret sharing scheme based on Chinese remainder theorem

被引:0
|
作者
Keju Meng
Fuyou Miao
Yu Ning
Wenchao Huang
Yan Xiong
Chin-Chen Chang
机构
[1] University of Science and Technology of China,School of Computer Science and Technology
[2] Feng Chia University,Department of Information Engineering and Computer Science
[3] Hangzhou Dianzi University,School of Computer Science and Technology
来源
关键词
proactive secret sharing; Chinese remainder theorem; polynomial ring; integer ring; isomorphism;
D O I
暂无
中图分类号
学科分类号
摘要
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders’ shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
引用
收藏
相关论文
共 50 条
  • [11] An asymptotically perfect secret sharing scheme based on the Chinese Remainder Theorem
    Liu, Yung-Hsiang
    Chen, Rong-Jaye
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (09) : 1890 - 1915
  • [12] Secret Sharing Scheme Based on Chinese Remainder Theorem in Cloud Computing
    Yang, Yuhan
    Du, Weizhang
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 618 - 621
  • [13] A reversible extended secret image sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Xiong, Yan
    Chang, Chin-Chen
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 95
  • [14] A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Nie, Daxin
    Luo, Xiangyang
    Sun, Jonathan Zheng
    INFORMATION SCIENCES, 2019, 473 : 13 - 30
  • [15] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [16] Weighted secret sharing based on the chinese remainder theorem
    Harn, Lein
    Fuyou, Miao
    International Journal of Network Security, 2014, 16 (06) : 420 - 426
  • [17] Verifiable secret sharing based on the Chinese remainder theorem
    Harn, Lein
    Miao Fuyou
    Chang, Chin-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 950 - 957
  • [18] Quantum Secret Sharing Based on Chinese Remainder Theorem
    Shi Rong-Hua
    Su Qian
    Guo Ying
    Lee, Moon Ho
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2011, 55 (04) : 573 - 578
  • [19] Quantum Secret Sharing Based on Chinese Remainder Theorem
    施荣华
    粟倩
    郭迎
    李门浩
    Communications in Theoretical Physics, 2011, 55 (04) : 573 - 578
  • [20] A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
    Verma, Om Prakash
    Jain, Nitin
    Pal, S. K.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2395 - 2406