Multilevel Threshold Secret Sharing based on the Chinese Remainder Theorem
Multilevel Threshold Secret Sharing based on the Chinese Remainder Theorem
In multilevel secret sharing, a secret is shared among a set of hierarchically organized participants in a way that the members of the superior compartments are more powerful and can replace the participants of an inferior one to form an authorized coalition during secret reconstruction. In this work, we first show that the only existing multilevel threshold secret sharing scheme based on the Chinese Remainder Theorem CRT is not secure and fails to work with certain natural threshold settings on compartments. As the main contribution, we propose a secure CRTbased scheme that works for all threshold settings. In the proposed scheme, we employ a refined version of Asmuth-Bloom secret sharing with a special and generic Asmuth-Bloom sequence called the anchor sequence. Based on this novel idea, we also propose the first multilevel conjunctive threshold secret sharing scheme based on the Chinese Remainder Theorem.
___
- [1] Charles Asmuth and John Bloom. A modular approach to
key safeguarding. IEEE Transactions on Information Theory,
30(2):208–210, 1983.
- [2] Amos Beimel. Secret-sharing schemes: A survey. volume 6639
of Coding and Cryptology, pages 11–46. 2011.
- [3] Mihir Bellare and Phillip Rogaway. Random oracles are
practical: A paradigm for designing efficient protocols. In
Proceedings of the 1st ACM Conference on Computer and
Communications Security, CCS ’93, pages 62–73, New York,
NY, USA, 1993. ACM.
- [4] George Robert Blakley. Safeguarding cryptographic keys. volume 48 of Proceedings of the National Computer Conference,
pages 313–317, 1979.
- [5] Ilker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selc¸uk. Secret
sharing for general access structures. 4th International Conference on Information Security and Cryptology, Ankara, Turkey,
2010.
- [6] Oguzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, ˘
Ali Aydin Selc¸uk, and Emin Anarim. A crt-based verifiable
secret sharing scheme secure against unbounded adversaries. Security and Communication Networks, 9(17):4416–4427, 2016.
- [7] Hossein Ghodosi, Josef Pieprzyk, and Rei Safavi-Naini. Secret
sharing in multilevel and compartmented groups. Information
Security and Privacy, pages 367–378, 1998.
- [8] Cheng Guo and Chin-Chen Chang. An authenticated group key
distribution protocol based on the generalized chinese remainder
theorem. International Journal of Communication Systems,
27(1):126–134, 2014.
- [9] Lein Harn and Miao Fuyou. Multilevel threshold secret sharing
based on the chinese remainder theorem. Information Processing Letters, 114(9):504–509, 2014.
- [10] Sorin Iftene. Compartmented secret sharing based on the
chinese remainder theorem. IACR Cryptology ePrint Archive,
2005:408, 2005.
- [11] Sorin Iftene. General secret sharing based on the chinese
remainder theorem with applications in e-voting. Electronic
Notes in Theoretical Computer Science, 186:67–84, 2007.
- [12] Mitsuru Ito, Akira Saito, and Takao Nishizeki. Secret sharing
scheme realizing general access structure. Proc. of the IEEE
Global Telecom. Conf., Globecom 87, pages 99–102, 1987.
- [13] Kamer Kaya and Ali Aydın Selc¸uk. A verifiable secret sharing
scheme based on the Chinese Remainder Theorem. volume
5365 of Progress in Cryptology - INDOCRYPT 2008, pages
414–425. 2008.
- [14] Kamer Kaya and Ali Aydın Selc¸uk. Threshold cryptography
based on Asmuth-Bloom secret sharing. Information Sciences,
177(19):4148–4160, 2007.
- [15] Kamer Kaya and Ali Aydin Selc¸uk. Sharing DSS by the chinese
remainder theorem. J. Computational Applied Mathematics,
259:495–502, 2014.
- [16] Yanjun Liu, Lein Harn, and Chin-Chen Chang. An authenticated
group key distribution mechanism using theory of numbers.
International Journal of Communication Systems, 27(11):3502–
3512, 2014.
- [17] Yanjun Liu, Lein Harn, and Chin-Chen Chang. A novel
verifiable secret sharing mechanism using theory of numbers
and a method for sharing secrets. International Journal of
Communication Systems, 28(7):1282–1292, 2015. IJCS-13-
0526.R3.
- [18] Maurice Mignotte. How to share a secret. Cryptography, pages
371–375. 1983.
- [19] Michael Quisquater, Bart Preneel, and Joos Vandewalle. On ¨
the security of the threshold scheme based on the Chinese
Remainder Theorem. Public Key Cryptography, pages 199–210,
2002.
- [20] Adi Shamir. How to share a secret. Communications of the
ACM, 22(11):612–613, 1979.
- [21] Gustavus J Simmons. How to (really) share a secret. Proceedings on Advances in Cryptology, pages 390–448, 1990.
- [22] Tamir Tassa. Hierarchical threshold secret sharing. Theory of
cryptography, pages 473–490. Springer, 2004.