A proactive secret sharing scheme based on Chinese remainder theorem

被引:8
|
作者
Meng, Keju [1 ]
Miao, Fuyou [1 ]
Ning, Yu [1 ]
Huang, Wenchao [1 ]
Xiong, Yan [1 ]
Chang, Chin-Chen [2 ,3 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
proactive secret sharing; Chinese remainder theorem; polynomial ring; integer ring; isomorphism;
D O I
10.1007/s11704-019-9123-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders' shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
    Om Prakash Verma
    Nitin Jain
    S. K. Pal
    Arabian Journal for Science and Engineering, 2020, 45 : 2395 - 2406
  • [22] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [23] A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network
    Xiaoping Li
    Ching-Chun Chang
    Yanjun Liu
    Telecommunication Systems, 2021, 78 : 49 - 56
  • [24] A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network
    Li, Xiaoping
    Chang, Ching-Chun
    Liu, Yanjun
    TELECOMMUNICATION SYSTEMS, 2021, 78 (01) : 49 - 56
  • [25] Multilevel threshold secret sharing based on the Chinese Remainder Theorem
    Harn, Lein
    Miao Fuyou
    INFORMATION PROCESSING LETTERS, 2014, 114 (09) : 504 - 509
  • [26] Practical Secret Image Sharing Based on the Chinese Remainder Theorem
    Li, Longlong
    Lu, Yuliang
    Liu, Lintao
    Sun, Yuyuan
    Wang, Jiayu
    MATHEMATICS, 2022, 10 (12)
  • [27] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Wei Hua
    Xiaofeng Liao
    Multimedia Tools and Applications, 2017, 76 : 7087 - 7103
  • [28] A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem
    He, Qi
    Yu, Shui
    Xu, Huifang
    Liu, Jia
    Huang, Dongmei
    Liu, Guohua
    Xu, Fangqin
    Du, Yanling
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (02): : 349 - 361
  • [29] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40713 - 40732
  • [30] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Hua, Wei
    Liao, Xiaofeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 7087 - 7103