Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polyn...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/163882 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-163882 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1638822022-12-21T03:34:32Z Bivariate polynomial-based secret sharing schemes with secure secret reconstruction Ding, Jian Ke, Pinhui Lin, Changlu Wang, Huaxiong School of Physical and Mathematical Sciences Science::Mathematics Secret Sharing Secure Secret Reconstruction A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polynomial-based (t,n)-SSR schemes, such as those of Harn et al. (Information Sciences 2020), are insecure, which is because the outside adversary may obtain the secret by solving a system of [Formula presented] linear equations. We revise Harn et al. scheme and get a secure (t,n)-SSR scheme based on a symmetric bivariate polynomial for the first time, where t⩽n⩽2t-1. To increase the range of n for a given t, we construct a secure (t,n)-SSR scheme based on an asymmetric bivariate polynomial for the first time, where n⩾t. We find that the share sizes of our schemes are the same or almost the same as other existing insecure (t,n)-SSR schemes based on bivariate polynomials. Moreover, our asymmetric bivariate polynomial-based (t,n)-SSR scheme is more easy to be constructed compared to the Chinese Remainder Theorem-based (t,n)-SSR scheme with the stringent condition on moduli, and their share sizes are almost the same. Ministry of Education (MOE) The work of Jian Ding and Changlu Lin was supported in part by National Natural Science Foundation of China under Grant Nos. U1705264 and 61572132, in part by Natural Science Foundation of Fujian Province under Grant No. 2019J01275, in part by Guangxi Key Laboratory of Trusted Software under Grant No. KX202039, and in part by University Natural Science Research Project of Anhui Province under Grant No. KJ2020A0779. The work of Pinhui Ke was supported by National Natural Science Foundation of China under Grant Nos. 61772292 and 61772476. The work of Huaxiong Wang was supported by the Singapore Ministry of Education under Grant Nos. RG12/19 and RG21/18 (S). 2022-12-21T03:34:32Z 2022-12-21T03:34:32Z 2022 Journal Article Ding, J., Ke, P., Lin, C. & Wang, H. (2022). Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Information Sciences, 593, 398-414. https://dx.doi.org/10.1016/j.ins.2022.02.005 0020-0255 https://hdl.handle.net/10356/163882 10.1016/j.ins.2022.02.005 2-s2.0-85125270741 593 398 414 en RG12/19 RG21/18 (S) Information Sciences © 2022 Elsevier Inc. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics Secret Sharing Secure Secret Reconstruction |
spellingShingle |
Science::Mathematics Secret Sharing Secure Secret Reconstruction Ding, Jian Ke, Pinhui Lin, Changlu Wang, Huaxiong Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
description |
A (t,n)-threshold scheme with secure secret reconstruction, or a (t,n)-SSR scheme for short, is a (t,n)-threshold scheme against the outside adversary who has no valid share, but can impersonate a participant to take part in the secret reconstruction phase. We point out that previous bivariate polynomial-based (t,n)-SSR schemes, such as those of Harn et al. (Information Sciences 2020), are insecure, which is because the outside adversary may obtain the secret by solving a system of [Formula presented] linear equations. We revise Harn et al. scheme and get a secure (t,n)-SSR scheme based on a symmetric bivariate polynomial for the first time, where t⩽n⩽2t-1. To increase the range of n for a given t, we construct a secure (t,n)-SSR scheme based on an asymmetric bivariate polynomial for the first time, where n⩾t. We find that the share sizes of our schemes are the same or almost the same as other existing insecure (t,n)-SSR schemes based on bivariate polynomials. Moreover, our asymmetric bivariate polynomial-based (t,n)-SSR scheme is more easy to be constructed compared to the Chinese Remainder Theorem-based (t,n)-SSR scheme with the stringent condition on moduli, and their share sizes are almost the same. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Ding, Jian Ke, Pinhui Lin, Changlu Wang, Huaxiong |
format |
Article |
author |
Ding, Jian Ke, Pinhui Lin, Changlu Wang, Huaxiong |
author_sort |
Ding, Jian |
title |
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
title_short |
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
title_full |
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
title_fullStr |
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
title_full_unstemmed |
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
title_sort |
bivariate polynomial-based secret sharing schemes with secure secret reconstruction |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/163882 |
_version_ |
1753801145981075456 |