Abstract
If an adversary tries to obtain a secret s in a (t, n) threshold secret sharing (SS) scheme, it has to capture no less than t shares instead of the secret s directly. However, if a shareholder keeps a fixed share for a long time, an adversary may have chances to filch some shareholders’ shares. In a proactive secret sharing (PSS) scheme, shareholders are supposed to refresh shares at fixed period without changing the secret. In this way, an adversary can recover the secret if and only if it captures at least t shares during a period rather than any time, and thus PSS provides enhanced protection to long-lived secrets. The existing PSS schemes are almost based on linear SS but no Chinese Remainder Theorem (CRT)-based PSS scheme was proposed. This paper proposes a PSS scheme based on CRT for integer ring to analyze the reason why traditional CRT-based SS is not suitable to design PSS schemes. Then, an ideal PSS scheme based on CRT for polynomial ring is also proposed. The scheme utilizes isomorphism of CRT to implement efficient share refreshing.
Similar content being viewed by others
References
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613
Blakley G R. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference. 1979, 313–317
Harn L, Lin C. Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers, 2010, 59(6): 842–846
Lv X, Li H, Wang B. Identity-based key distribution for mobile Ad Hoc networks. Frontiers of Computer Science, 2011, 5(4): 442–447
Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings-Computers and Digital Techniques, 1994, 141(5): 307–313
Tang S. Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 2004, 1(2): 259–262
Kamal A A A M, Iwamura K. Conditionally secure multiparty computation using secret sharing scheme for n < 2 k − 1. In: Proceedings of the 15th Annual Conference on Privacy, Security and Trust. 2017, 225–230
Patra A, Choudhury A, Rangan C P. Efficient asynchronous verifiable secret sharing and multiparty computation. Journal of Cryptology, 2015, 28(1): 49–109
Song Y, Li Z, Li Y, Xin R. The optimal information rate for graph access structures of nine participants. Frontiers of Computer Science, 2015, 9(5): 778–787
Jia X, Wang D, Nie D, Luo X, Sun J Z. A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences, 2019, 473: 13–30
McEliece R J, Sarwate D V. On sharing secrets and Reed-Solomon codes. Communications of the ACM, 1981, 24(9): 583–584
Mignotte M. How to share a secret. In: Proceedings of Workshop on Cryptography. 1982, 371–375
Asmuth C, Bloom J. A modular approach to key safeguarding. IEEE Transactions on Information Theory, 1983, 29(2): 208–210
Ning Y, Miao F, Huang W, Meng K, Xiong Y, Wang X. Constructing ideal secret sharing schemes based on Chinese Remainder Theorem. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2018, 310–331
Ostrovsky R, Yung M. How to withstand mobile virus attacks. In: Proceedings of the 10th ACM Conference on Principles of Distributed Systems. 1991, 51–59
Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: how to cope with perpetual leakage. In: Proceedings of Annual International Cryptology Conference. 1995, 339–352
Dehkordi M H, Mashhadi S, Oraei H. A proactive multi stage secret sharing scheme for any given access structure. Wireless Personal Communications, 2019, 104(1): 491–503
Mashhadi S. Secure publicly verifiable and proactive secret sharing schemes with general access structure. Information Sciences, 2017, 378: 99–108
Nikov V, Nikova S, Preneel B, Vandewalle, J. Applying general access structure to proactive secret sharing schemes. IACR Cryptology ePrint Archive, 2002, 2002: 141
Zou H, Wang J. Multi-level threshold multi-secret sharing scheme with proactive security. Journal of Computer Applications, 2009
Feng B, Guo C, Li M, Wang Z. A novel proactive multi-secret sharing scheme. International Journal of Network Security, 2015, 17(2): 123–128
Cachin C, Kursawe K, Lysyanskaya A, Strobl R. Method of verifiably sharing a secret in potentially asynchronous networks. U.S. Patent 7, 389, 416. 2008-6-17
Zhou L, Schneider F B, Van Renesse R. APSS: proactive secret sharing in asynchronous systems. ACM Transactions on Information and System Security, 2005, 8(3): 259–286
Schultz D A, Liskov B, Liskov M. MPSS: mobile proactive secret sharing. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing. 2008, 458
Baron J, El Defrawy K, Lampkins J, Ostrovsky R. Communication-optimal proactive secret sharing for dynamic groups. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2015, 23–41
Numao M. A secure key registration system based on proactive secret-sharing scheme. In: Proceedings of the 4th International Symposium on Autonomous Decentralized Systems-Integration of Heterogeneous Systems. 1999, 230–237
Yang J P, Rhee K H, Sakurai K. A proactive secret sharing for server assisted threshold signatures. In: Proceedings of International Conference on High Performance Computing and Communications. 2006, 250–259
Ribet S A F W G K A. Graduate Texts in Mathematics 111. USA: Springer, 1987
Capocelli R M, De Santis A, Gargano L, Vaccaro U. On the size of shares for secret sharing schemes. Journal of Cryptology, 1993, 6(3): 157–167
Feldman P. A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th Annual Symposium on Foundations of Computer Science. 1987, 427–438
Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of Annual International Cryptology Conference. 1991, 129–140
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Grant No. 61572454), National Key R&D Project (2018YFB2100301, 2018YFB0803400) and the National Natural Science Foundation of China (Grant Nos. 61572453, 61520106007).
Author information
Authors and Affiliations
Corresponding author
Additional information
Keju Meng is a PhD student studying in the School of Computer Science and Technology (USTC), China. He received bachelor’s degree from Dalian Universiry of Technology (DLUT), China in 2016. His research interests include Internet of things, network security and secret sharing.
Fuyou Miao received the PhD degree in computer science from USTC, China, where he is an associate professor currently with school of computer science and technolog. His research interests include information security, information coding key management in WSN, and network security.
Yu Ning is a PhD student with the School of Computer Science and Technology in USTC, China. He received bachelor’s degree in electronics engineering from USTC, China in 2016. His research interests include pure mathematics and secret sharing.
Wenchao Huang received BS and PhD degrees from USTC, China in 2006 and 2011 respectively. Now, he is an associate professor currently with school of computer science and technology, USTC, China. His current research interests include mobile computing, information security, trusted computing, and formal methods.
Yan Xiong received the BS, MS, and PhD degrees from USTC, China in 1983, 1986, and 1990, respectively. He is currently a professor with the School of Computer Science and Technology. His research interests include distributed processing, mobile computing, and information security.
Chin-Chen Chang is a fellow of IEEE and IET. His current title is Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, China. His specialties include, but not limited to, data engineering, computer cryptography and information security.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Meng, K., Miao, F., Ning, Y. et al. A proactive secret sharing scheme based on Chinese remainder theorem. Front. Comput. Sci. 15, 152801 (2021). https://doi.org/10.1007/s11704-019-9123-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-019-9123-z