Skip to main content

Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12383))

Abstract

Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction phase. The benefit is that the outside adversary cannot learn the secret even if it is recovered by more than t shareholders. Moreover, Harn has further extended this scheme into a multi-secret sharing scheme so that multiple secrets can be recovered individually at different stagies. Both schemes are claimed to achieve the perfectness property using heuristic arguments. However, in this paper, we show that the above claim is false and these schemes are not perfect. In the first scheme, the coalition of \(t-1\) shareholders can conclude that the secret is not uniformly distributed. And in the multi-secret sharing scheme, when the public parameters satisfy some special conditions, the coalition of \(t-1\) shareholders can even use the recovered secrets to preclude some possible values for the unrecovered secrets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that similar technique has been used in [9] and this scheme was attacked by a novel cryptanalysis, called linear subspace attack [2]. But our work is different from the existing attack and it illustrates some other weaknesses of Harn’s work.

References

  1. Aggarwal, D., et al.: Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part II. LNCS, vol. 11693, pp. 510–539. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_18

    Chapter  Google Scholar 

  2. Ahmadian, Z., Jamshidpour, S.: Linear subspace cryptanalysis of Harn’s secret sharing-based group authentication scheme. IEEE Trans. Inf. Forensics Secur. 13(2), 502–510 (2017)

    Article  Google Scholar 

  3. Applebaum, B., Beimel, A., Farràs, O., Nir, O., Peter, N.: Secret-sharing schemes for general and uniform access structures. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part III. LNCS, vol. 11478, pp. 441–471. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_15

    Chapter  Google Scholar 

  4. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  5. Blakley, R.: Safeguarding cryptographic keys. In: Proceedings of Americian Federation of Information Processing Societies (AFIPS’79), vol. 48, pp. 313–317 (1979)

    Google Scholar 

  6. Blundo, C., De Santis, A., Di Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multi-secret sharing schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 150–163. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_17

    Chapter  Google Scholar 

  7. Brickell, E.F.: Some ideal secret sharing schemes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 468–475. Springer, Heidelberg (1990). https://doi.org/10.1007/3-540-46885-4_45

    Chapter  Google Scholar 

  8. Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Remarks on the multiple assignment secret sharing scheme. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 72–80. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028463

    Chapter  Google Scholar 

  9. Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2012)

    Article  MathSciNet  Google Scholar 

  10. Harn, L.: Secure secret reconstruction and multi-secret sharing schemes with unconditional security. Secur. Commun. Netw. 7(3), 567–573 (2014)

    Article  Google Scholar 

  11. Harn, L., Xia, Z., Hsu, C., Liu, Y.: Secret sharing with secure secret reconstruction. Inf. Sci. 519, 1–8 (2020)

    Article  MathSciNet  Google Scholar 

  12. Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371–375. Springer, Heidelberg (1983). https://doi.org/10.1007/3-540-39466-4_27

    Chapter  Google Scholar 

  13. Shamir, A.: How to share a secret. In: Proceedings of 22nd Communication of ACM, pp. 612–613 (1979)

    Google Scholar 

  14. Srinivasan, A., Vasudevan, P.N.: Leakage resilient secret sharing and applications. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part II. LNCS, vol. 11693, pp. 480–509. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_17

    Chapter  Google Scholar 

  15. Xia, Z., Yang, B., Zhou, Y., Zhang, M., Shen, H., Mu, Y.: Provably secure proactive secret sharing without the adjacent assumption. In: Steinfeld, R., Yuen, T.H. (eds.) ProvSec 2019. LNCS, vol. 11821, pp. 247–264. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31919-9_14

    Chapter  Google Scholar 

  16. Xia, Z., Yang, Z., Xiong, S., Hsu, C.-F.: Game-based security proofs for secret sharing schemes. In: Yang, C.-N., Peng, S.-L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 650–660. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_53

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was partially supported by the Guizhou Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhe Xia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, M., Xia, Z. (2021). Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics