Abstract
Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction phase. The benefit is that the outside adversary cannot learn the secret even if it is recovered by more than t shareholders. Moreover, Harn has further extended this scheme into a multi-secret sharing scheme so that multiple secrets can be recovered individually at different stagies. Both schemes are claimed to achieve the perfectness property using heuristic arguments. However, in this paper, we show that the above claim is false and these schemes are not perfect. In the first scheme, the coalition of \(t-1\) shareholders can conclude that the secret is not uniformly distributed. And in the multi-secret sharing scheme, when the public parameters satisfy some special conditions, the coalition of \(t-1\) shareholders can even use the recovered secrets to preclude some possible values for the unrecovered secrets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aggarwal, D., et al.: Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part II. LNCS, vol. 11693, pp. 510–539. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_18
Ahmadian, Z., Jamshidpour, S.: Linear subspace cryptanalysis of Harn’s secret sharing-based group authentication scheme. IEEE Trans. Inf. Forensics Secur. 13(2), 502–510 (2017)
Applebaum, B., Beimel, A., Farrà s, O., Nir, O., Peter, N.: Secret-sharing schemes for general and uniform access structures. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part III. LNCS, vol. 11478, pp. 441–471. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_15
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
Blakley, R.: Safeguarding cryptographic keys. In: Proceedings of Americian Federation of Information Processing Societies (AFIPS’79), vol. 48, pp. 313–317 (1979)
Blundo, C., De Santis, A., Di Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multi-secret sharing schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 150–163. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_17
Brickell, E.F.: Some ideal secret sharing schemes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 468–475. Springer, Heidelberg (1990). https://doi.org/10.1007/3-540-46885-4_45
Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Remarks on the multiple assignment secret sharing scheme. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 72–80. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028463
Harn, L.: Group authentication. IEEE Trans. Comput. 62(9), 1893–1898 (2012)
Harn, L.: Secure secret reconstruction and multi-secret sharing schemes with unconditional security. Secur. Commun. Netw. 7(3), 567–573 (2014)
Harn, L., Xia, Z., Hsu, C., Liu, Y.: Secret sharing with secure secret reconstruction. Inf. Sci. 519, 1–8 (2020)
Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371–375. Springer, Heidelberg (1983). https://doi.org/10.1007/3-540-39466-4_27
Shamir, A.: How to share a secret. In: Proceedings of 22nd Communication of ACM, pp. 612–613 (1979)
Srinivasan, A., Vasudevan, P.N.: Leakage resilient secret sharing and applications. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part II. LNCS, vol. 11693, pp. 480–509. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_17
Xia, Z., Yang, B., Zhou, Y., Zhang, M., Shen, H., Mu, Y.: Provably secure proactive secret sharing without the adjacent assumption. In: Steinfeld, R., Yuen, T.H. (eds.) ProvSec 2019. LNCS, vol. 11821, pp. 247–264. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31919-9_14
Xia, Z., Yang, Z., Xiong, S., Hsu, C.-F.: Game-based security proofs for secret sharing schemes. In: Yang, C.-N., Peng, S.-L., Jain, L.C. (eds.) SICBS 2018. AISC, vol. 895, pp. 650–660. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16946-6_53
Acknowledgement
This work was partially supported by the Guizhou Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Xiao, M., Xia, Z. (2021). Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-68884-4_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68883-7
Online ISBN: 978-3-030-68884-4
eBook Packages: Computer ScienceComputer Science (R0)