New results and applications for multi-secret sharing schemes

被引:0
|
作者
Javier Herranz
Alexandre Ruiz
Germán Sáez
机构
[1] Universitat Politècnica de Catalunya – BarcelonaTech,Department of Matemàtica Aplicada IV
来源
关键词
Multi-secret sharing schemes; Multi-policy cryptosystems; Entropy; Provable security; 94A62; 94A60; 94A17;
D O I
暂无
中图分类号
学科分类号
摘要
In a multi-secret sharing scheme (MSSS), ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document} different secrets are distributed among the players in some set P={P1,…,Pn}\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal{P }=\{P_1,\ldots ,P_n\}$$\end{document}, each one according to an access structure. The trivial solution to this problem is to run ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document} independent instances of a standard secret sharing scheme, one for each secret. In this solution, the length of the secret share to be stored by each player grows linearly with ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document} (when keeping all other parameters fixed). Multi-secret sharing schemes have been studied by the cryptographic community mostly from a theoretical perspective: different models and definitions have been proposed, for both unconditional (information-theoretic) and computational security. In the case of unconditional security, there are two different definitions. It has been proved that, for some particular cases of access structures that include the threshold case, a MSSS with the strongest level of unconditional security must have shares with length linear in ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document}. Therefore, the optimal solution in this case is equivalent to the trivial one. In this work we prove that, even for a more relaxed notion of unconditional security, and for some kinds of access structures (in particular, threshold ones), we have the same efficiency problem: the length of each secret share must grow linearly with ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end{document}. Since we want more efficient solutions, we move to the scenario of MSSSs with computational security. We propose a new MSSS, where each secret share has constant length (just one element), and we formally prove its computational security in the random oracle model. To the best of our knowledge, this is the first formal analysis on the computational security of a MSSS. We show the utility of the new MSSS by using it as a key ingredient in the design of two schemes for two new functionalities: multi-policy signatures and multi-policy decryption. We prove the security of these two new multi-policy cryptosystems in a formal security model. The two new primitives provide similar functionalities as attribute-based cryptosystems, with some advantages and some drawbacks that we discuss at the end of this work.
引用
收藏
页码:841 / 864
页数:23
相关论文
共 50 条
  • [1] New results and applications for multi-secret sharing schemes
    Herranz, Javier
    Ruiz, Alexandre
    Saez, German
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 841 - 864
  • [2] Linear multi-secret sharing schemes
    XIAO Liangliang & LIU Mulan Academy of Mathematics and System Sciences and Key Laboratory of Mathematics Mechanization
    Science in China(Series F:Information Sciences), 2005, (01) : 125 - 136
  • [3] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    Science in China Series F: Information Sciences, 2005, 48 : 125 - 136
  • [4] Linear multi-secret sharing schemes
    Xiao, LL
    Liu, ML
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 125 - 136
  • [5] New efficient and practical verifiable multi-secret sharing schemes
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    INFORMATION SCIENCES, 2008, 178 (09) : 2262 - 2274
  • [6] Consideration for multi-threshold multi-secret sharing schemes
    Waseda, Atsushi
    Soshi, Masakazu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 265 - 269
  • [7] Secure secret reconstruction and multi-secret sharing schemes with unconditional security
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 567 - 573
  • [8] A New Approach to Weighted Multi-Secret Sharing
    Zou, Xukai
    Maino, Fabio
    Bertino, Elisa
    Sui, Yan
    Wang, Kai
    Li, Feng
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [9] Attacks to some verifiable multi-secret sharing schemes and two improved schemes
    Liu, Yanhong
    Zhang, Futai
    Zhang, Jie
    INFORMATION SCIENCES, 2016, 329 : 524 - 539
  • [10] Verifiable Multi-secret Sharing Schemes from Homogeneous Linear Recursion
    He Jun
    Li Lijuan
    Li Ximei
    Tang Chunming
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 370 - 373