Abstract
Threshold schemes enable a group of users to share a secret by providing each user with a share. The scheme has a threshold t+1 if any subset with cardinality t + 1 of the shares enables the secret to be recovered.
In 1983, C. Asmuth and J. Bloom proposed such a scheme based on the Chinese remainder theorem. They derived a complex relation between the parameters of the scheme in order to satisfy some notion of security. However, at that time, the concept of security in cryptography had not yet been formalized.
In this paper, we revisit the security of this threshold scheme in the modern context of security. In particular, we prove that the scheme is asymptotically optimal both from an information theoretic and complexity theoretic viewpoint when the parameters satisfy a simplified relationship. We mainly present three theorems, the two first theorems strengthen the result of Asmuth and Bloom and place it in a precise context, while the latest theorem is an improvement of a result obtained by Goldreich et al.
F.W.O.-research fellow, sponsored by the Fund for Scientific Research - Flanders (Belgium).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. inform. Theory, 1983, IT-29, pp. 208–210.
Blakley, G.R.: Safeguarding cryptographic keys. AFIPS Conf. Proc., 1979, 48, pp. 313–317.
Desmedt, Y., Frankel, Y.: Homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM J. discr. math., 1994, 7, pp. 667–679.
Gallager, R.G.: Information Theory and Reliable Communication. Willey, 1968.
Goldwasser S., Bellare M.: Lectures Notes on Cryptography. 1996–2001. http://www-cse.ucsd.edu/users/mihir/papers/gb.html.
Goldreich, O., Ron, D., Sudan, M.: Chinese remainder with errors. IEEE Trans. Inform. Theory, 2000, IT-46, pp. 1330–1338.
Karnin, E.D., Greene, J.W., Hellman, M.E.: On secret sharing systems. IEEE Trans. Inform. Theory, 1983, IT-29, pp. 35–41.
Mignotte, M.: How to share a secret. Advances in Cryptology — Eurocrypt’82, LNCS, 1983, 149, Springer-Verlag, pp. 371–375.
Ribenboim, P.: The Book of Prime Number Records. Springer-Verlag, 1988.
Shamir, A.: How to share a secret. Commun. ACM 1979, 22, pp. 612–613.
Stinson, D.R., Vanstone S.A. SIAM J. discr. math., 1988, 1, pp. 230–236.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Quisquater, M., Preneel, B., Vandewalle, J. (2002). On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_14
Download citation
DOI: https://doi.org/10.1007/3-540-45664-3_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43168-8
Online ISBN: 978-3-540-45664-3
eBook Packages: Springer Book Archive