A proactive secret sharing scheme based on Chinese remainder theorem

被引:8
|
作者
Meng, Keju [1 ]
Miao, Fuyou [1 ]
Ning, Yu [1 ]
Huang, Wenchao [1 ]
Xiong, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
proactive secret sharing; Chinese remainder theorem; polynomial ring; integer ring; isomorphism;
D O I
10.1007/s11704-019-9123-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders' shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju MENG
    Fuyou MIAO
    Yu NING
    Wenchao HUANG
    Yan XIONG
    ChinChen CHANG
    Frontiers of Computer Science, 2021, (02) : 127 - 136
  • [2] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju Meng
    Fuyou Miao
    Yu Ning
    Wenchao Huang
    Yan Xiong
    Chin-Chen Chang
    Frontiers of Computer Science, 2021, 15
  • [3] Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem
    Singh, Nidhi
    Tentu, Appala Naidu
    Basit, Abdul
    Venkaiah, V. Ch.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 583 - 588
  • [4] A collaborative secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Song, Yixuan
    Wang, Daoshun
    Nie, Daxin
    Wu, Jinzhao
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1280 - 1299
  • [5] A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Kaya, Kamer
    Selcuk, Ali Aydin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 414 - 425
  • [6] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [7] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62
  • [8] An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Zhang, Yun
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 259 - +
  • [9] An efficient generalized secret sharing scheme based on Chinese Remainder Theorem
    Chang, Chin-Chen
    Yang, Jen-Ho
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2006, 5 : 333 - 336
  • [10] Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Wu, Yujiang
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1945 - +