Perfect verification of modular scheme
Abstract
Secret sharing schemes are used to distribute a secret value among a group of users so that only authorized set of them can reconstruct the original secret correctly. The modular secret sharing scheme (MSSS) we are studying is based on the Chinese Remainder Theorem. In this scheme the secrets s(x), S(x), s1(x),…, sk(x) are defined as follows s(x) = S(x) = mod m(x), si(x) = S(x) mod mi(x), i = 1, 2, …, k. All the secrets and moduli are chosen from polynomial ring Fp[x], and the reconstruction of secret s(x) is carried out by applying the above-mentioned Chinese Remainder Theorem. The verification of any secret sharing scheme is understood as the protocol of verification by the participants of their partial secrets and (or) the protocol for verifying the legitimacy of the actions of the dealer. In this paper, we introduce a perfect verification protocol of MSSS. It means that none information leaks under distribution and verification. Two verification protocols are introduced in this paper. The first one is simpler and it depends on assumption about dealer honesty. If there is no such assumption verification is more complex. Both protocols are based on one work by J. Benalo and generalize the protocol proposed earlier by M. Vaskovsky and G. Matveev in two ways. First, the general, not only the threshold access structure is verified, and secondly, the dealer is not necessarily honest. Earlier, N. Shenets found the perfection condition of MSSS. Thus, if these conditions аre met, both the MSSS and its verification protocol are perfect.
References
- Cramer R, Damgård I, Nielsen JB. Multiparty Computation from Threshold Homomorphic Encryption. In: Pfitzmann B, editor. Advances in Cryptology – EUROCRYPT 2001. Berlin, Heidelberg: Springer; 2001. p. 280–300. (Lecture Notes in Computer Science; volume 2045). DOI: 10.1007/3-540-44987-6_18.
- Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. Proceedings of 2007 IEEE Symposium on Security and Privacy. 2007 May 20–23; Berkeley, California, USA. Los Alamitos, California: IEEE Computer Society; 2007. p. 321–334.
- Benaloh JC. Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract). In: Odlyzko AM, editor. Advances in Cryptology – CRYPTO’86. Berlin, Heidelberg: Springer; 1987. p. 251–260. (Lecture Notes in Computer Science; volume 263). DOI: 10.1007/3-540-47721-7_19.
- Galibus TV, Matveev GV. Verification of the modular secret sharing parameters. Vestnik BGU. Seriya 1, Fizika. Matematika. Informatika. 2015;1:76 –79. Russian.
- Vaskouski MM, Matveev GV. Verification of modular secret sharing. Journal of the Belarusian State University. Matematics and Informatics. 2017;2:17–22. Russian.
- Galibus TV. Verification of modular secret sharing over a binary field. Vestnik Brestskogo gosudarstvennogo tekhnicheskogo universiteta. Seriya 1, Fizika, matematika, informatika. 2014;5:26 –27. Russian.
- Galibus T, Matveev G. Generalized Mignotte’s sequences over polynomial rings. Electronic Notes Theoretical Computer Science. 2007;186:43– 48. DOI: 10.1016/j.entcs.2006.12.044.
- Shenets NN. On the information level of modular secret sharing schemes. Doklady Natsional’noi akademii nauk Belarusi. Seriya fizikomatematicheskikh nauk. 2010;54(6):9 –12. Russian.
Copyright (c) 2018 Journal of the Belarusian State University. Mathematics and Informatics
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The authors who are published in this journal agree to the following:
- The authors retain copyright on the work and provide the journal with the right of first publication of the work on condition of license Creative Commons Attribution-NonCommercial. 4.0 International (CC BY-NC 4.0).
- The authors retain the right to enter into certain contractual agreements relating to the non-exclusive distribution of the published version of the work (e.g. post it on the institutional repository, publication in the book), with the reference to its original publication in this journal.
- The authors have the right to post their work on the Internet (e.g. on the institutional store or personal website) prior to and during the review process, conducted by the journal, as this may lead to a productive discussion and a large number of references to this work. (See The Effect of Open Access.)