


全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Author B Schoenmakers Verifi able Secret Sharing A basic secret sharing scheme is defi ned to resist passive attacks only which means that its security depends on the assumption that all parties involved run the protocols as prescribed by the scheme After taking part in the distribution protocol a non qualifi ed set of participants is not able to deduce part of the secret from their shares In many applications however a secret sharing scheme is also required to withstand active attacks This is accomplished by verifi able secret sharing VSS schemes as fi rst introduced in CGMA85 Specifi cally a VSS scheme is required to withstand the following two types of active attacks a dealer sending inconsistent or incorrect shares to some of the participants during the distribution protocol and participants submitting incorrect shares during the reconstruction protocol Clearly Shamir s threshold scheme is not a VSS scheme since it does not exclude either of these attacks A well known example is Feldman s VSS scheme Fel87 Informally Feldman s scheme runs as follows for the case of t n threshold access structures 1 t n Let g denote a generator of a cyclic group G of order p where p is a large prime p n The distribution protocol and reconstruction protocol for dealer and participants P1 Pn are defi ned as follows Distribution Let s RZpdenote the secret to be distributed by the dealer The dealer chooses a random polynomial in Zp x of the form a x s 1x t 1xt 1 subject to the condition that 0 s The dealer sends share si a i to participant Piin private for i 1 n In addition the dealer broadcasts values Bj g j 0 j t Upon receipt of its share si each participant verifi es the validity of the share by evaluating the following equation gsi t 1 Y j 0 Bi j j 1 Reconstruction Each share sicontributed by participant Pi is verifi ed using Eq 1 The secret s a 0 is then recovered as in Shamir s threshold scheme using t valid shares Because of Eq 1 it is impossible for the dealer to give out inconsistent shares to honest participants The only way the dealer may cheat is by sending incorrect shares to some participants Each participant receiving an incorrect share during the distribution protocol is supposed to fi le a complaint against the dealer If the dealer receives t or more complaints the distribution is said to fail Otherwise the dealer is required to broadcast the correct shares si 1 for all participants Pi who fi led a complaint If the decisional Diffi e Hellmann problem is hard for group G Feldman s VSS scheme is secure against cheating by the dealer and cheating by at most t 1 of the participants as long as 2 t 1 n Another well known example is Pedersen s VSS scheme Ped92 The schemes by Feldman and Pedersen are called non interactive because the distribution protocol does not require any interaction between the dealer and participants nor between participants among each other except for the fi ling of complaints Publicly verifi able secret sharing PVSS schemes as introduced by Stadler Sta96 remove the need for interaction entirely by ensuring that anyone not just the participants is able to verify the shares distributed by the dealer see also FO98 Sch99 YY01 Many examples of interactive VSS schemes can be found in papers presenting protocols for secure multiparty computation see GMW87 BGW88 CCD88 and later papers Typically interactive VSS schemes rely on the use of authentication tags checking vectors or similar ideas For instance the VSS scheme of BGW88 lets the dealer choose a random bivariate polynomial p x y of degree at most t 1 such that s p 0 0 for a secret s The dealer sends each participant Pitwo univariate polynomials of degree at most t 1 ai x p x i and bi y p i y Each participant is supposed to check that ai i bi i Furthermore each pair of participants Piand Pjchecks that ai j bj i An interactive protocol between the dealer and the participants is used to determine whether distribution was successful or not Apart from their use in secure multiparty computation VSS schemes are specifi cally used in the construction of distributed key generation DKG protocols which are in turn a basic tool in threshold cryptography The object of a DKG protocol is to let a group of n parties jointly generate a key consisting of a private key and a public key such that the private key is shared among the n parties see e g Ped91 GJKR99 GJKR03 References BGW88 M Ben Or S Goldwasser and A Wigderson Completeness theorems for non cryptographic fault tolerant distributed computation In Proc 20th Symposium on Theory of Computing STOC 88 pages 1 10 New York 1988 A C M CCD88 D Chaum C Cr epeau and I Damg ard Multiparty unconditionally secure pro tocols In Proc 20th Symposium on Theory of Computing STOC 88 pages 11 19 New York 1988 A C M CGMA85 B Chor S Goldwasser S Micali and B Awerbuch Verifi able secret sharing and achieving simultaneity in the presence of faults In Proc 26th IEEE Symposium on Foundations of Computer Science FOCS 85 pages 383 395 IEEE Computer Society 1985 Fel87 P Feldman A practical scheme for non interactive verifi able secret sharing In Proc 28th IEEE Symposium on Foundations of Computer Science FOCS 87 pages 427 437 IEEE Computer Society 1987 FO98 E Fujisaki and T Okamoto A practical and provably secure scheme for pub licly verifi able secret sharing and its applications In Advances in Cryptology 2 EUROCRYPT 98 volume 1403 of Lecture Notes in Computer Science pages 32 46 Berlin 1998 Springer Verlag GJKR99 R Gennaro S Jarecki H Krawczyk and T Rabin Secure distributed key generation for discrete log based cryptosystems In Advances in Cryptology EUROCRYPT 99 volume 1592 of Lecture Notes in Computer Science pages 295 310 Berlin 1999 Springer Verlag GJKR03 R Gennaro S Jarecki H Krawczyk and T Rabin Secure applications of pedersens distributed key generation protocol In Cryptographers Track RSA 2003 volume 2612 of Lecture Notes in Computer Science pages 373 390 Berlin 2003 Springer Verlag GMW87 O Goldreich S Micali and A Wigderson How to play any mental game or a completeness theorem for protocols with honest majority In Proc 19th Symposium on Theory of Computing STOC 87 pages 218 229 New York 1987 A C M Ped91 T Pedersen A threshold cryptosystem without a trusted party In Advances in Cryptology EUROCRYPT 91 volume 547 of Lecture Notes in Computer Science pages 522 526 Berlin 1991 Springer Verlag Ped92 T P Pedersen Non interactive and information theoretic secure verifi able secret sharing In Advances in Cryptology CRYPTO 91
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025私人汽车买卖合同
- 安防监控服务合同范本
- 2025劳动合同承诺书样本
- 2025年二人合作经营合同
- 2025年农业用地上房屋交易合同
- 搭配中的学问说课课件
- 2025商店租赁权抵押合同
- 搞笑课件教学课件
- 创业面试常见问题及答案解析
- 农业“脑机接口”诞生:植物电信号解码器能否预知病虫害暴发
- 全国内资企业生存时间分析报告
- 简思plc状态帧使用说明书
- THSPP 0010-2023 欧标茶生产茶园栽培技术规程
- 附件2:“揭榜挂帅”制项目申报材料参照模板
- GB/T 7113.5-2011绝缘软管第5部分:硅橡胶玻璃纤维软管
- GB/T 4668-1995机织物密度的测定
- GB/T 29256.5-2012纺织品机织物结构分析方法第5部分:织物中拆下纱线线密度的测定
- GB/T 27750-2011绝缘液体的分类
- GB/T 1410-2006固体绝缘材料体积电阻率和表面电阻率试验方法
- 工会法律知识考试参考题库350题(含答案)
- 产品说明中文asd-7110管状体电机说明书
评论
0/150
提交评论