1 / 15

A Perfect Threshold Secret Sharing Scheme to Identify Cheaters

A Perfect Threshold Secret Sharing Scheme to Identify Cheaters. Marco Carpentieri Designs, Codes and Cryptography 5(3):183-187, May 1995 Presented by Po-Kun Chou 2002/4/22. Outline. Introduction The Construction Properties.

Download Presentation

A Perfect Threshold Secret Sharing Scheme to Identify Cheaters

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Perfect Threshold Secret Sharing Scheme to Identify Cheaters Marco Carpentieri Designs, Codes and Cryptography 5(3):183-187, May 1995 Presented by Po-Kun Chou 2002/4/22

  2. Outline • Introduction • The Construction • Properties

  3. Introduction • In 1979 Blakley and Shamir gave protocols to solve problem known as “(k,n) Threshold Secret Sharing” • A threshold secret sharing is said to be unconditionally secure if the probability of successful cheating is limited to a specify probability even if the cheaters are assumed to have infinite computational resources. • McEliece and Sarwate use an error-correcting code to construct a threshold secret sharing scheme in which any group of k+2e participants which includes at most e cheaters can correctly calculate the secret. • Tompa and Woll’s scenario: Can detect cheating but cannot identify cheater.

  4. Introduction(const) • Brickell and Stinson’s modified version of the Blakley’s construction in which honest participants can identify cheaters. • Rabin and Ben-Or’s scheme: Each participants Pi in P receives his share di and extra information which is n-1random elements Vi,j ,for j=1,..,n and j≠ i, each participant Pj in P-{Pi} receives n-1 pairs (Wj,i,Zj,i),for i=1,..,n and i ≠j,where Wj,i ≠0 is a random element and Zj,i is calculated as Zj,i= di + Vi,j Wj,i when Pi wants to let Pj know his share,he returns the pair (di,Vi,j),then Pj can calculate di + Vi,jWj,i and he accepts di only if the result is Zj,i. • In this paper we present a perfect and unconditionally secure (k,n) threshold secret sharing scheme having the same properties of Rabin and Ben-Or’s scheme,but in which the information given to each participant is smaller(k+2(n-1) elements of a finite field).

  5. The Construction • S is the secret chosen in the finite field GF(q) by the Dealer(Dl) • When Dl wants share S among participants in P ,Dl gives a k-dimensional vector di≡ (di,0, di,1,…,di,k-1),k≦ n over GF(q) as a share to participant Pi,for i=1,…,n. • Dl chooses the shares: a1,a2,…,ak-1:participants unknow α1, α2,…,αn:participants know q(x)=S+ a1x+ a2x2+…+ak-1xk-1 ,then di,0=q(αi) and di,1,…,di,k-1are random chosen uniformly at random in GF(q),for i=1,..,n. • To guard against cheating,Dl distributes”extra information” which consists of n-1 pairs of elements in GF(q) for each Pj in P to the participants along with their shares.

  6. The Construction(const) • Dl calculate bj,i=gj,idi,0+αj di,1 +…+αjk-1 di,k-1and he gives Pj the pair (gj,i, bj,i),for i=1,..,n and i ≠j and gj,i be non null elements chosen uniformly at random in GF(q). • When Pi returns his share di, Pj can check the authenticity of di by verifying that it is a solution vector of the equation gj,iy0+αj y1 +…+αjk-1 yk-1= bj,i ,where y0,y1,…yk-1are the unknows, gj,i ,αj ,… αjk-1 are the coefficients and bj,i is the constant,for i=1,…,n and i ≠j.

  7. Properties • Lemma 1: Any k participants can calculate the secret S,but no subset of fewer than k participants can determine any partial information regarding s • Lemma 2: Any participant who attempts to cheat will be identified by any honest participant with probability 1 – [1/(q-1)]

  8. Properties(const) • Lemma 3: Even if there is only one honest participant and the remaining n-1 participants form a coalition in order to deceive him,their probability of cheating successfully is only 1-(1-[1/(q-1)])n-k+1 ≦(n-k+1)/(q-1) • Lemma 4: The secret information given to each participant consists of k+2(n-1) elements of the finite field GF(q).

  9. Properties(const) • Lemma 5: The construction can be implemented in polynomial time

  10. ~The end~

  11. Rabin and Ben-Or’s scheme Pi: 1.share: di 2.extra information: n-1 random elements Vi,j (j≠i) Pj: n-1 pairs (Wj,i,Zj,i) and Zj,i= di + Vi,j Wj,i Pi將(di,Vi,j)送給Pj,然後Pj用已知的(Wj,i,Zj,i)驗證Pi送的是否正確 For example: P1送d1以及V1,2,V1,3給P2,P3 P1: P2: P3: d1=3 W2,1=4 W3,1=5 V1,2=5 Z2,1=23 Z3,1=13 V1,3=2 23=3+5*4 13=3+2*5

  12. Marco Carpentieri’s scheme Dl: 1. k-dimensional vector di≡ (di,0, di,1,…,di,k-1),k≦ n 2. a1,a2,…,ak-1:participants unknow 3. α1, α2,…,αn:participants know 4. q(x)=S+ a1x+ a2x2+…+ak-1xk-1=>S為secret 5. di,0=q(αi) and di,1,…,di,k-1are random chosen 6.Calculate bj,i=gj,idi,0+αj di,1 +…+αjk-1 di,k-1 7.Gives Pi: di 8.Gives Pj: n-1 pairs (bj,i,gj,i) Pi: gives Pj his share di Pj: verifying if gj,idi,0+αj di,1 +…+αjk-1 di,k-1= bj,i

  13. Properties • Lemma 1: Any k participants can calculate the secret S,but no subset of fewer than k participants can determine any partial information regarding s =>because there are qk-r-1 possible solutions (r<k) • Lemma 2: Any participant who attempts to cheat will be identified by any honest participant with probability 1 – [1/(q-1)] =>because only one of the possible equations that the participant Pj could have to check the share of Pi

  14. Properties(const) • Lemma 3: Even if there is only one honest participant and the remaining n-1 participants form a coalition in order to deceive him,their probability of cheating successfully is only 1-(1-[1/(q-1)])n-k+1 ≦(n-k+1)/(q-1) • Lemma 4: The secret information given to each participant consists of k+2(n-1) elements of the finite field GF(q). =>because each participant receives k elements of GF(q) as his share and 2(n-1) elements of extra information

  15. Properties(const) • Lemma 5: The construction can be implemented in polynomial time =>Dl calculates the power of αj in k(k-1)/2 multiplications. then the constants bj,i are calculated in k(n-1) multiplications.Dl needs k(k-1)/2+n(k-1)multiplications.

More Related