skip to main content
10.1145/3538969.3544424acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Secret sharing a key in a distributed way, Lagrange vs Newton

Published:23 August 2022Publication History

ABSTRACT

In secret sharing, a dealer knows the secret it shares. In a distributed key generation (DKG) protocol, a shared secret is collectively generated in a group in a completely distributed way such that any subset of size greater than a threshold can reveal or use the shared secret, while smaller subsets do not have any knowledge about it. The most important aspect is that there is no dealer or trusted party. The core idea of secret sharing schemes is Shamir’s secret sharing method, which uses Lagrange’s interpolation to reconstruct the shared secret key. This paper investigates an alternative method, called Newton’s interpolation and it cites the probability of implementing it on current DKG protocols.

References

  1. Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, and Alin Tomescu. 2021. Reaching consensus for asynchronous distributed key generation. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. 363–373.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Charles Asmuth and John Bloom. 1983. A modular approach to key safeguarding. IEEE transactions on information theory 29, 2 (1983), 208–210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jean-Paul Berrut and Lloyd N Trefethen. 2004. Barycentric lagrange interpolation. SIAM review 46, 3 (2004), 501–517.Google ScholarGoogle Scholar
  4. Sergey Bezzateev, Vadim Davydov, and Aleksandr Ometov. 2020. On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication. Cryptography 4, 4 (2020), 34.Google ScholarGoogle ScholarCross RefCross Ref
  5. Richard E Blahut. 2012. Algebraic methods for signal processing and communications coding. Springer Science & Business Media.Google ScholarGoogle Scholar
  6. Roland Bulirsch, Josef Stoer, and J Stoer. 2002. Introduction to numerical analysis. Vol. 3. Springer.Google ScholarGoogle Scholar
  7. Ran Canetti, Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, and Tal Rabin. 1999. Adaptive security for threshold cryptosystems. In Annual International Cryptology Conference. Springer, 98–116.Google ScholarGoogle ScholarCross RefCross Ref
  8. Samuel Daniel Conte and Carl De Boor. 2017. Elementary numerical analysis: an algorithmic approach. SIAM.Google ScholarGoogle Scholar
  9. Sourav Das, Zhuolun Xiang, and Ling Ren. 2021. Asynchronous data dissemination and its applications. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 2705–2721.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sourav Das, Tom Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, and Ling Ren. 2021. Practical asynchronous distributed key generation. Cryptology ePrint Archive(2021).Google ScholarGoogle Scholar
  11. Information Technology Laboratory Computer Security Division. 2010 (accessed May 2, 2022). Multi-party threshold cryptography: CSRC. https://csrc.nist.gov/Projects/threshold-cryptography.Google ScholarGoogle Scholar
  12. Pierre-Alain Fouque and Jacques Stern. 2001. One round threshold discrete-log key generation without private channels. In International Workshop on Public Key Cryptography. Springer, 300–316.Google ScholarGoogle ScholarCross RefCross Ref
  13. Tatyana Galibus and Genadii Matveev. 2007. Generalized mignotte’s sequences over polynomial rings. Electronic Notes in Theoretical Computer Science 186 (2007), 43–48.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2021. Efficient asynchronous byzantine agreement without private setups. arXiv preprint arXiv:2106.07831(2021).Google ScholarGoogle Scholar
  15. Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, and Tal Rabin. 1999. Secure distributed key generation for discrete-log based cryptosystems. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 295–310.Google ScholarGoogle ScholarCross RefCross Ref
  16. Jens Groth. 2021. Non-interactive distributed key generation and key resharing. Cryptology ePrint Archive(2021).Google ScholarGoogle Scholar
  17. Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, and Alin Tomescu. 2021. Aggregatable distributed key generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 147–176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548(2018).Google ScholarGoogle Scholar
  19. Sorin Iftene. 2007. General secret sharing based on the chinese remainder theorem with applications in e-voting. Electronic Notes in Theoretical Computer Science 186 (2007), 67–84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Aniket Kate, Yizhou Huang, and Ian Goldberg. 2012. Distributed key generation in the wild. Cryptology ePrint Archive(2012).Google ScholarGoogle Scholar
  21. Noam Kogan and Tamir Tassa. 2006. Improved efficiency for revocation schemes via Newton interpolation. ACM Transactions on Information and System Security (TISSEC) 9, 4(2006), 461–486.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Eleftherios Kokoris Kogias, Dahlia Malkhi, and Alexander Spiegelman. 2020. Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 1751–1767.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Maurice Mignotte. 1982. How to share a secret. In Workshop on cryptography. Springer, 371–375.Google ScholarGoogle Scholar
  24. Diego Munuera-Merayo. 2021. On Mignotte secret sharing schemes over Gaussian integers. arXiv preprint arXiv:2104.06361(2021).Google ScholarGoogle Scholar
  25. Wafa Neji, Kaouther Blibech, and Narjes Ben Rajeb. 2016. Distributed key generation protocol with a new complaint management strategy. Security and communication networks 9, 17 (2016), 4585–4595.Google ScholarGoogle Scholar
  26. Orbs Network. 2018. DKG for BLS threshold signature scheme on the EVM using solidity.Google ScholarGoogle Scholar
  27. Ibrahim Ozbek, Fatih Temiz, and SİAP İrfan. 2019. A generalization of the Mignotte’s scheme over Euclidean domains and applications to secret image sharing. Journal of Algebra Combinatorics Discrete Structures and Applications 6, 3(2019), 147–161.Google ScholarGoogle ScholarCross RefCross Ref
  28. Torben Pryds Pedersen. 1991. A threshold cryptosystem without a trusted party. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 522–526.Google ScholarGoogle ScholarCross RefCross Ref
  29. Philipp Schindler. 2020. Ethereum-based Distributed Key Generation Protocol.Google ScholarGoogle Scholar
  30. Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, and Edgar Weippl. 2019. Ethdkg: Distributed key generation with ethereum smart contracts. Cryptology ePrint Archive(2019).Google ScholarGoogle Scholar
  31. Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Alin Tomescu, Robert Chen, Yiming Zheng, Ittai Abraham, Benny Pinkas, Guy Golan Gueta, and Srinivas Devadas. 2020. Towards scalable threshold cryptosystems. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 877–893.Google ScholarGoogle ScholarCross RefCross Ref
  33. Güzin Ulutaş, Mustafa Ulutaş, and Vasif Nabiyev. 2011. Secret sharing scheme based on mignotte’s scheme. In 2011 IEEE 19th Signal Processing and Communications Applications Conference (SIU). IEEE, 291–294.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Secret sharing a key in a distributed way, Lagrange vs Newton

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
            August 2022
            1371 pages
            ISBN:9781450396707
            DOI:10.1145/3538969

            Copyright © 2022 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 August 2022

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate228of451submissions,51%
          • Article Metrics

            • Downloads (Last 12 months)34
            • Downloads (Last 6 weeks)4

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format