Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2022, Vol. 16 Issue (1) : 161807    https://doi.org/10.1007/s11704-020-0300-x
RESEARCH ARTICLE
A novel threshold changeable secret sharing scheme
Lein HARN1, Chingfang HSU2(), Zhe XIA3
1. Department of Computer Science Electrical Engineering, University of Missouri-Kansas City, Kansas City, MO 64110, USA
2. Computer School, Central China Normal University,Wuhan 430079, China
3. Department of Computer Science, Wuhan University of Technology,Wuhan 430071, China
 Download: PDF(373 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

A (t, n) threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing. In conventional threshold secret sharing schemes, like Shamir’s scheme based on a univariate polynomial, additional communication key share scheme is needed for shareholders to protect the secrecy of their shares if secret reconstruction is performed over a network. In the secret reconstruction, the threshold changeable secret sharing (TCSS) allows the threshold to be a dynamic value so that if some shares have been compromised in a given time, it needs more shares to reconstruct the secret. Recently, a new secret sharing scheme based on a bivariate polynomial is proposed in which shares generated initially by a dealer can be used not only to reconstruct the secret but also to protect the secrecy of shares when the secret reconstruction is performed over a network. In this paper, we further extend this scheme to enable it to be a TCSS without any modification. Our proposed TCSS is dealer-free and non-interactive. Shares generated by a dealer in our scheme can serve for three purposes, (a) to reconstruct a secret; (b) to protect the secrecy of shares if secret reconstruction is performed over a network; and (c) to enable the threshold changeable property.

Keywords cryptography 94A60      authentication and secret cryptography 94A60      authentication and secret     
Corresponding Author(s): Chingfang HSU   
Just Accepted Date: 18 December 2020   Issue Date: 03 November 2021
 Cite this article:   
Lein HARN,Chingfang HSU,Zhe XIA. A novel threshold changeable secret sharing scheme[J]. Front. Comput. Sci., 2022, 16(1): 161807.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-020-0300-x
https://academic.hep.com.cn/fcs/EN/Y2022/V16/I1/161807
1 A Shamir. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613
https://doi.org/10.1145/359168.359176
2 G R Blakley. Safeguarding cryptographic keys. In: Proceedings of Managing Requirements Knowledge, International Workshop on IEEE Computer Society. 1979
https://doi.org/10.1109/MARK.1979.8817296
3 L Harn, C Lin. Strong (n, t, n) verifiable secret sharing scheme. Information Sciences, 2010, 180(16): 3059–3064
https://doi.org/10.1016/j.ins.2010.04.016
4 L Harn, M Fuyou, C C Chang. Verifiable secret sharing based on the Chinese remainder theorem. Security and Communication Networks, 2014, 7(6): 950–957
https://doi.org/10.1002/sec.807
5 G Fuchsbauer, J Katz, D Naccache. Efficient rational secret sharing in standard communication networks. In: Proceedings of Springer Theory of Cryptography Conference. 2010, 419–436
https://doi.org/10.1007/978-3-642-11799-2_25
6 C Tartary, H X Wang, Y Zhang. An efficient and information theoretically secure rational secret sharing scheme based on symmetric bivariate polynomials. International Journal of Foundations of Computer Science, 2011, 22(6): 1395–1416
https://doi.org/10.1142/S0129054111008775
7 A Herzberg, S Jarecki, H Krawczyk, M Yung. Proactive secret sharing or: how to cope with perpetual leakage. In: Proceedings of Springer Annual International Cryptology Conference. 1995, 339–352
https://doi.org/10.1007/3-540-44750-4_27
8 L Harn, C F Xu. Dynamic threshold secret reconstruction and its application to the threshold cryptography. Information Processing Letters, 2015, 115(11): 851–857
https://doi.org/10.1016/j.ipl.2015.06.014
9 L Harn, C F Xu, Z Xia, J Zhou. How to share secret efficiently over networks. Journal of Security and Communication Networks, 2017, 2017(4): 1–6
https://doi.org/10.1155/2017/5437403
10 K Martin, J Pieprzyk, R Safavi-Naini, H Wang. Changing thresholds in the absence of secure channels. In: Proceedings of Springer Australasian Conference on Information Security and Privacy. 1999, 177–191
https://doi.org/10.1007/3-540-48970-3_15
11 R Steinfeld, H Wang, J Pieprzyk. Lattice-based threshold changeability for standard Shamir secret-sharing schemes. IEEE Transactions on Information Theory, 2007, 53(7): 2542–2559
https://doi.org/10.1109/TIT.2007.899541
12 C A Asmuth, J Bloom. A modular approach to key safeguarding. IEEE Transactions on Information Theory, 1983, 29(2): 208–210
https://doi.org/10.1109/TIT.1983.1056651
13 C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung. Perfectly-secure key distribution for dynamic conferences. Information and Computation, 1998, 146(1): 1–23
https://doi.org/10.1006/inco.1998.2717
14 R Blom. An optimal class of symmetric key generation systems. In: Proceedings of Springer Workshop on the Theory and Application of of Cryptographic Techniques. 1984, 335–338
https://doi.org/10.1007/3-540-39757-4_22
15 J Katz, C Y Koo, R Kumaresan. Improving the round complexity of VSS in point-to point networks. Information and Computation, 2009, 207(8): 889–899
https://doi.org/10.1016/j.ic.2009.03.007
16 R Kumaresan, A Patra, C P Rangan. The round complexity of verifiable secret sharing: the statistical case. In: Proceedings of Springer International Conference on the Theory and Application of Cryptology and Information Security. 2010, 431–447
https://doi.org/10.1007/978-3-642-17373-8_25
17 V Nikov, S Nikova. On proactive secret sharing schemes. In: Proceedings of Springer International Workshop on Selected Areas in Cryptography. 2004, 308–325
https://doi.org/10.1007/978-3-540-30564-4_22
18 Z Zhang, Y M Chee, S Ling, M Liu, H Wang. Threshold changeable secret sharing schemes revisited. Theoretical Computer Science, 2012, 418: 106–115
https://doi.org/10.1016/j.tcs.2011.09.027
19 KM Martin, J Pieprzyk, R Safavi-Nain, H Wang. Changing thresholds in the absence of secure channels. In: Proceedings of Springer Australasian Conference on Information Security and Privacy. 1999, 177–191
https://doi.org/10.1007/3-540-48970-3_15
20 T Lou, C Tartary. Analysis and design of multiple threshold changeable secret sharing. In: Proceedings of Springer International Conference on Cryptology and Network Security. 2008, 196–213
https://doi.org/10.1007/978-3-540-89641-8_14
21 R Steinfeld, J Pieprzyk, H X Wang. Lattice-based threshold changeability for standard CRT secret-sharing schemes. Finite Fields and Their Applications, 2006, 12(4): 653–680
https://doi.org/10.1016/j.ffa.2005.04.007
22 L Yuan, M Li, C Guo, K K R Choo, Y Ren. Novel threshold changeable secret sharing schemes based on polynomial interpolation. PLoS ONE, 2016, 11(10): 1–19
https://doi.org/10.1371/journal.pone.0165512
23 K Meng, F Miao, W Huang, Y Xiong. Threshold changeable secret sharing with secure secret reconstruction. Information Processing Letters, 2020, 157: 105928
https://doi.org/10.1016/j.ipl.2020.105928
24 K Saniee. A simple expression for multivariate lagrange interpolation. Journal of Society for Industrial and Applied Mathematics, 2007, 1–9
https://doi.org/10.1137/08S010025
25 E K Donald. The art of computer programming. Sorting and Searching, 1999, 3: 426–458
26 R L Rivest, A Shamir, L Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978, 21(2): 120–126
https://doi.org/10.1145/359340.359342
27 D E R Denning. Cryptography and Data Security. Massachusetts: Addison Wesley, 1982
[1] Article highlights Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed