Bivariate polynomial-based secret sharing schemes with secure secret reconstruction

A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polyn...

Full description

Saved in:
Bibliographic Details
Main Authors: Ding, Jian, Ke, Pinhui, Lin, Changlu, Wang, Huaxiong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/163882
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-163882
record_format dspace
spelling sg-ntu-dr.10356-1638822022-12-21T03:34:32Z Bivariate polynomial-based secret sharing schemes with secure secret reconstruction Ding, Jian Ke, Pinhui Lin, Changlu Wang, Huaxiong School of Physical and Mathematical Sciences Science::Mathematics Secret Sharing Secure Secret Reconstruction A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polynomial-based (t,n)-SSR schemes, such as those of Harn et al. (Information Sciences 2020), are insecure, which is because the outside adversary may obtain the secret by solving a system of [Formula presented] linear equations. We revise Harn et al. scheme and get a secure (t,n)-SSR scheme based on a symmetric bivariate polynomial for the first time, where t⩽n⩽2t-1. To increase the range of n for a given t, we construct a secure (t,n)-SSR scheme based on an asymmetric bivariate polynomial for the first time, where n⩾t. We find that the share sizes of our schemes are the same or almost the same as other existing insecure (t,n)-SSR schemes based on bivariate polynomials. Moreover, our asymmetric bivariate polynomial-based (t,n)-SSR scheme is more easy to be constructed compared to the Chinese Remainder Theorem-based (t,n)-SSR scheme with the stringent condition on moduli, and their share sizes are almost the same. Ministry of Education (MOE) The work of Jian Ding and Changlu Lin was supported in part by National Natural Science Foundation of China under Grant Nos. U1705264 and 61572132, in part by Natural Science Foundation of Fujian Province under Grant No. 2019J01275, in part by Guangxi Key Laboratory of Trusted Software under Grant No. KX202039, and in part by University Natural Science Research Project of Anhui Province under Grant No. KJ2020A0779. The work of Pinhui Ke was supported by National Natural Science Foundation of China under Grant Nos. 61772292 and 61772476. The work of Huaxiong Wang was supported by the Singapore Ministry of Education under Grant Nos. RG12/19 and RG21/18 (S). 2022-12-21T03:34:32Z 2022-12-21T03:34:32Z 2022 Journal Article Ding, J., Ke, P., Lin, C. & Wang, H. (2022). Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Information Sciences, 593, 398-414. https://dx.doi.org/10.1016/j.ins.2022.02.005 0020-0255 https://hdl.handle.net/10356/163882 10.1016/j.ins.2022.02.005 2-s2.0-85125270741 593 398 414 en RG12/19 RG21/18 (S) Information Sciences © 2022 Elsevier Inc. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics
Secret Sharing
Secure Secret Reconstruction
spellingShingle Science::Mathematics
Secret Sharing
Secure Secret Reconstruction
Ding, Jian
Ke, Pinhui
Lin, Changlu
Wang, Huaxiong
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
description A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polynomial-based (t,n)-SSR schemes, such as those of Harn et al. (Information Sciences 2020), are insecure, which is because the outside adversary may obtain the secret by solving a system of [Formula presented] linear equations. We revise Harn et al. scheme and get a secure (t,n)-SSR scheme based on a symmetric bivariate polynomial for the first time, where t⩽n⩽2t-1. To increase the range of n for a given t, we construct a secure (t,n)-SSR scheme based on an asymmetric bivariate polynomial for the first time, where n⩾t. We find that the share sizes of our schemes are the same or almost the same as other existing insecure (t,n)-SSR schemes based on bivariate polynomials. Moreover, our asymmetric bivariate polynomial-based (t,n)-SSR scheme is more easy to be constructed compared to the Chinese Remainder Theorem-based (t,n)-SSR scheme with the stringent condition on moduli, and their share sizes are almost the same.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Ding, Jian
Ke, Pinhui
Lin, Changlu
Wang, Huaxiong
format Article
author Ding, Jian
Ke, Pinhui
Lin, Changlu
Wang, Huaxiong
author_sort Ding, Jian
title Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
title_short Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
title_full Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
title_fullStr Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
title_full_unstemmed Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
title_sort bivariate polynomial-based secret sharing schemes with secure secret reconstruction
publishDate 2022
url https://hdl.handle.net/10356/163882
_version_ 1753801145981075456