Verification of modular secret sharing
Abstract
In the present paper new scheme of secret verification are constructed. Verification with trusted party participation is conducted with help of an external device, which takes an arbitrary polynomial S(x), input element x0 ∈ Fpn and returns a value ξS(x0), where ξ is an Fpn – valued uniformly distributed random variable. It is shown that using of such device allows any user to verify his secret. Polynomial verification scheme is based on verification of divisibility g(x)|f(x) in the ring Z[x]. Only a value of polynomial S(x) in unknown point x = l is disclosed at the proposed verification method. Benaloh’s verification of the modular scheme allows any shareholder to ensure in consistency of all partial secrets, i. e. any legal group of shareholders can restore the secret S(x) correctly. None information about the secret S(x), excepting a prior information, is disclosed. The proposed protocols can be used safely for schemes over arbitrary finite fields without additional restrictions on a size of a filed.
References
- Cramer R., Damgard I., Nielsen J. Multiparty Computation from Threshold Homomorphic Encryption // Lect. notes comput. sci. 2001. Vol. 2045. P. 280 –300.
- Bethencourt J., Sahai A., Waters B. Ciphertext-policy attribute-based encryption. Proceedings of IEEE Symposium on Security and Privacy. Berkley, 2007. P. 321–334.
- Benaloh J. Secret sharing homomorphisms: keeping shares of a secret. Lect. Notes Comput. Sci. 1987. Vol. 263. P. 251–260.
- Blum M., Feldman P., Micali S. Non Interactive Zero-Knowledge and Its Applications. Proceedings of the 20th aCM Symposium on Theory of Computing. New York, 1988. P. 103–112. DOI: 10.1145/62212.62222.
- Galibus T., Matveev G., Shenets N. Some structural and security properties of the modular secret sharing. Proceedings of SYNASC’08 : IEEE Comp. soc. press (Timisoara, 26 –29 Sept., 2008). Timisoara, 2008. P. 197–200.
- Informatsionnye tekhnologii i bezopasnost’. Algoritmy razdeleniya sekreta : STB 34.101.60 –2011. Introd. 01.07.2011 (in Russ.).
- Galibus T. V., Matveev G. V. Verification of the modular secret sharing parameters. Vestnik BGU. Ser. 1, Fiz. Mat. Inform. 2015. No. 1. P. 76 –79 (in Russ.).
- Galibus T., Matveev G. Generalized Mignotte Sequences in Polynomial Rings. ENTCS. 2007. Vol. 186. P. 43– 48.
- Shamir A. How to share a secret. Commun. aCM. 1979. Vol. 22, No. 11. P. 612– 613.
- Asmuth C. A., Bloom J. A modular approach to key safeguarding. IEEE Trans. Inf. Theory. 1983. Vol. 29, issue 2. P. 208–210. DOI: 10.1109/TIT.1983.1056651.
- Vaskouski M. M., Matveev G. V. [Polynomial verifications of the shamir scheme]. Information Systems and Technologies : Int. cong. comput. sci. (Minsk, 24 –27 Oct., 2016). Minsk, 2016. P. 431– 433 (in Russ.).
The authors who are published in this journal agree to the following:
- The authors retain copyright on the work and provide the journal with the right of first publication of the work on condition of license Creative Commons Attribution-NonCommercial. 4.0 International (CC BY-NC 4.0).
- The authors retain the right to enter into certain contractual agreements relating to the non-exclusive distribution of the published version of the work (e.g. post it on the institutional repository, publication in the book), with the reference to its original publication in this journal.
- The authors have the right to post their work on the Internet (e.g. on the institutional store or personal website) prior to and during the review process, conducted by the journal, as this may lead to a productive discussion and a large number of references to this work. (See The Effect of Open Access.)