Skip to main content
Log in

A proactive secret sharing scheme based on Chinese remainder theorem

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders’ shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613

    Article  MathSciNet  MATH  Google Scholar 

  2. Blakley G R. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. 1979, 313–317

  3. Harn L, Lin C. Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers, 2010, 59(6): 842–846

    Article  MathSciNet  MATH  Google Scholar 

  4. Lv X, Li H, Wang B. Identity-based key distribution for mobile Ad Hoc networks. Frontiers of Computer Science, 2011, 5(4): 442–447

    Article  MathSciNet  MATH  Google Scholar 

  5. Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings-Computers and Digital Techniques, 1994, 141(5): 307–313

    Article  MATH  Google Scholar 

  6. Tang S. Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 2004, 1(2): 259–262

    Google Scholar 

  7. Kamal A A A M, Iwamura K. Conditionally secure multiparty computation using secret sharing scheme for n < 2 k − 1. In: Proceedings of the 15th Annual Conference on Privacy, Security and Trust. 2017, 225–230

  8. Patra A, Choudhury A, Rangan C P. Efficient asynchronous verifiable secret sharing and multiparty computation. Journal of Cryptology, 2015, 28(1): 49–109

    Article  MathSciNet  MATH  Google Scholar 

  9. Song Y, Li Z, Li Y, Xin R. The optimal information rate for graph access structures of nine participants. Frontiers of Computer Science, 2015, 9(5): 778–787

    Article  Google Scholar 

  10. Jia X, Wang D, Nie D, Luo X, Sun J Z. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences, 2019, 473: 13–30

    Article  MathSciNet  MATH  Google Scholar 

  11. McEliece R J, Sarwate D V. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 1981, 24(9): 583–584

    Article  MathSciNet  Google Scholar 

  12. Mignotte M. How to share a secret. In: Proceedings of Workshop on Cryptography. 1982, 371–375

  13. Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Transactions on Information Theory, 1983, 29(2): 208–210

    Article  MathSciNet  MATH  Google Scholar 

  14. Ning Y, Miao F, Huang W, Meng K, Xiong Y, Wang X. Constructing ideal secret sharing schemes based on Chinese Remainder Theorem. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2018, 310–331

  15. Ostrovsky R, Yung M. How to withstand mobile virus attacks. In: Proceedings of the 10th ACM Conference on Principles of Distributed Systems. 1991, 51–59

  16. Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: how to cope with perpetual leakage. In: Proceedings of Annual International Cryptology Conference. 1995, 339–352

  17. Dehkordi M H, Mashhadi S, Oraei H. A proactive multi stage secret sharing scheme for any given access structure. Wireless Personal Communications, 2019, 104(1): 491–503

    Article  Google Scholar 

  18. Mashhadi S. Secure publicly verifiable and proactive secret sharing schemes with general access structure. Information Sciences, 2017, 378: 99–108

    Article  MathSciNet  MATH  Google Scholar 

  19. Nikov V, Nikova S, Preneel B, Vandewalle, J. Applying general access structure to proactive secret sharing schemes. IACR Cryptology ePrint Archive, 2002, 2002: 141

    MATH  Google Scholar 

  20. Zou H, Wang J. Multi-level threshold multi-secret sharing scheme with proactive security. Journal of Computer Applications, 2009

  21. Feng B, Guo C, Li M, Wang Z. A novel proactive multi-secret sharing scheme. International Journal of Network Security, 2015, 17(2): 123–128

    Google Scholar 

  22. Cachin C, Kursawe K, Lysyanskaya A, Strobl R. Method of verifiably sharing a secret in potentially asynchronous networks. U.S. Patent 7, 389, 416. 2008-6-17

  23. Zhou L, Schneider F B, Van Renesse R. APSS: proactive secret sharing in asynchronous systems. ACM Transactions on Information and System Security, 2005, 8(3): 259–286

    Article  Google Scholar 

  24. Schultz D A, Liskov B, Liskov M. MPSS: mobile proactive secret sharing. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing. 2008, 458

  25. Baron J, El Defrawy K, Lampkins J, Ostrovsky R. Communication-optimal proactive secret sharing for dynamic groups. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2015, 23–41

  26. Numao M. A secure key registration system based on proactive secret-sharing scheme. In: Proceedings of the 4th International Symposium on Autonomous Decentralized Systems-Integration of Heterogeneous Systems. 1999, 230–237

  27. Yang J P, Rhee K H, Sakurai K. A proactive secret sharing for server assisted threshold signatures. In: Proceedings of International Conference on High Performance Computing and Communications. 2006, 250–259

  28. Ribet S A F W G K A. Graduate Texts in Mathematics 111. USA: Springer, 1987

    Google Scholar 

  29. Capocelli R M, De Santis A, Gargano L, Vaccaro U. On the size of shares for secret sharing schemes. Journal of Cryptology, 1993, 6(3): 157–167

    Article  MATH  Google Scholar 

  30. Feldman P. A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th Annual Symposium on Foundations of Computer Science. 1987, 427–438

  31. Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of Annual International Cryptology Conference. 1991, 129–140

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 61572454), National Key R&D Project (2018YFB2100301, 2018YFB0803400) and the National Natural Science Foundation of China (Grant Nos. 61572453, 61520106007).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fuyou Miao.

Additional information

Keju Meng is a PhD student studying in the School of Computer Science and Technology (USTC), China. He received bachelor’s degree from Dalian Universiry of Technology (DLUT), China in 2016. His research interests include Internet of things, network security and secret sharing.

Fuyou Miao received the PhD degree in computer science from USTC, China, where he is an associate professor currently with school of computer science and technolog. His research interests include information security, information coding key management in WSN, and network security.

Yu Ning is a PhD student with the School of Computer Science and Technology in USTC, China. He received bachelor’s degree in electronics engineering from USTC, China in 2016. His research interests include pure mathematics and secret sharing.

Wenchao Huang received BS and PhD degrees from USTC, China in 2006 and 2011 respectively. Now, he is an associate professor currently with school of computer science and technology, USTC, China. His current research interests include mobile computing, information security, trusted computing, and formal methods.

Yan Xiong received the BS, MS, and PhD degrees from USTC, China in 1983, 1986, and 1990, respectively. He is currently a professor with the School of Computer Science and Technology. His research interests include distributed processing, mobile computing, and information security.

Chin-Chen Chang is a fellow of IEEE and IET. His current title is Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, China. His specialties include, but not limited to, data engineering, computer cryptography and information security.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, K., Miao, F., Ning, Y. et al. A proactive secret sharing scheme based on Chinese remainder theorem. Front. Comput. Sci. 15, 152801 (2021). https://doi.org/10.1007/s11704-019-9123-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-019-9123-z

Keywords

Navigation