Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme

Ping Long, Bo Mi, Darong Huang, Hongyang Pan
{"title":"Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme","authors":"Ping Long, Bo Mi, Darong Huang, Hongyang Pan","doi":"10.1109/SAFEPROCESS45799.2019.9213385","DOIUrl":null,"url":null,"abstract":"Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.","PeriodicalId":353946,"journal":{"name":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
(k, n)-阈值乘式秘密共享方案的密码分析
Shamir的秘密共享方案是现代密码学的重要组成部分。然而,由于两个变量之间的乘法不是线性的,如何保密和有效地将两个共享的秘密相乘仍然是一个悬而未决的问题。最近,Taihei等人提出了一种可行的(k, n)阈值秘密共享协议,即使只有$k$台服务器可用,也能实现这样的产品结果。然而,我们认为他们的方案是脆弱的,阈值属性不能抵御协同攻击。因此,本文针对这些方案设计了一种实用的破解方法。通过深入分析,可以看出我们的方案能够以高概率有效地揭示共享秘密,尽管被泄露的服务器少于$k$。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Fault Estimation and Fault-tolerant Control of Hypersonic Aircraft Based on Adaptive Observer A Real-Time Anomaly Detection Approach Based on Sparse Distributed Representation Multimode Process Monitoring with Mode Transition Constraints Active Fault-Tolerant Tracking Control of an Unmanned Quadrotor Helicopter under Sensor Faults Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1