
Previous Article
Selfdual $\mathbb{F}_q$linear $\mathbb{F}_{q^t}$codes with an automorphism of prime order
 AMC Home
 This Issue

Next Article
Another look at security definitions
On dealerfree dynamic threshold schemes
1.  Department of Computer Science, Southern Illinois University, Carbondale, IL 62901, United States 
2.  David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada 
Therefore, we first provide the first comprehensive study of threshold modification techniques in both the passive and active adversary models. We first review an existing method for threshold modification based on resharing shares of a secret; this method is secure in the setting of a passive adversarial coalition. We then discuss two methods, termed public evaluation (for threshold reduction) and zero addition (for threshold increase) that can be used in both the passive and active adversarial setting. In the case of an active adversary, the techniques make use of verifiable secret sharing schemes, whereas the schemes considered in the passive adversary model are all based on the Shamir scheme. As an application, we discuss how the threshold and the secret can be changed multiple times to arbitrary values after the scheme's initialization.
References:
[1] 
S. G. Barwick, W. A. Jackson and K. M. Martin, Updating the parameters of a threshold scheme by minimal broadcast, IEEE Trans. Inform. Theory, 51 (2005), 620633. doi: 10.1109/TIT.2004.840857. 
[2] 
D. Beaver, Multiparty protocols tolerating half faulty processors, in "9th Annual International Cryptology Conference, CRYPTO,'' Springer, (1989), 560572. 
[3] 
M. BenOr, S. Goldwasser and A. Wigderson, Completeness theorems for noncryptographic faulttolerant distributed computation, in "20th Annual ACM Symposium on Theory of Computing, STOC,'' (1988), 110. 
[4] 
B. Blakley, G. R. Blakley, A. H. Chan and J. L. Massey, Threshold schemes with disenrollment, in "CRYPTO,'' (1992), 540548. 
[5] 
G. R. Blakley, Safeguarding cryptographic keys, in "National Computer Conference,'' AFIPS Press, (1979), 313317. 
[6] 
C. Blundo, A. Cresti, A. De Santis and U. Vaccaro, Fully dynamic secret sharing schemes, Theoret. Comp. Sci., 165 (1996), 407440. 
[7] 
B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in "26th Annual IEEE Symposium on Foundations of Computer Science, FOCS,'' (1985), 383395. 
[8] 
P. D'Arco and D. R. Stinson, On unconditionally secure robust distributed key distribution centers, in "8th Int. Conf. on the Theory and Application of Cryptology and Info. Security, ASIACRYPT,'' Springer, (2002), 346363. 
[9] 
Y. Desmedt and S. Jajodia, Redistributing secret shares to new access structures and its applications, in "Technical Report ISSE TR9701,'' George Mason Univ., 1997. 
[10] 
R. Gennaro, Y. Ishai, E. Kushilevitz and T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in "33th Annual ACM Symposium on Theory of Computing, STOC,'' (2001), 580589. 
[11] 
R. Gennaro, M. O. Rabin and T. Rabin, Simplified vss and fasttrack multiparty computations with applications to threshold cryptography, in "17th annual ACM symposium on Principles of Distributed Computing, PODC,'' (1998), 101111. 
[12] 
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, in "15th Annual International Cryptology Conference, CRYPTO,'' Springer, (1995), 339352. 
[13] 
I. Ingemarsson and G. J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutualy trusted party, in "EUROCRYPT'' (I. Damgård), Springer, (1990), 266282. 
[14] 
W.A. Jackson, K. M. Martin and C. M. O'Keefe, Mutually trusted authorityfree secret sharing schemes, J. Cryptology, 10 (1997), 261289. doi: 10.1007/s001459900031. 
[15] 
A. Maeda, A. Miyaji and M. Tada, Efficient and unconditionally secure verifiable threshold changeable scheme, in "6th Australasian Conference Information Security and Privacy, ACISP,'' Springer, (2001), 403416. 
[16] 
K. Martin, Dynamic access policies for unconditionally secure secret sharing schemes, in "Proceedings of IEEE Information Theory Workshop (ITW 2005),'' IEEE, (2005), 6166. 
[17] 
K. M. Martin, J. Pieprzyk, R. SafaviNaini and H. X. Wang, Changing thresholds in the absence of secure channels, in "4th Australasian Conference Information Security and Privacy, ACISP,'' Springer, (1999), 177191. 
[18] 
K. M. Martin, R. SafaviNaini and H. X. Wang, Bounds and techniques for efficient redistribution of secret shares to new access structures, Computer J., 42 (1999), 638649. 
[19] 
V. Nikov and S. Nikova, On proactive secret sharing schemes, in "11th International Workshop on Selected Areas in Cryptography, SAC,'' Springer, (2004), 308325. 
[20] 
M. Nojoumian, D. R. Stinson and M. Grainger, Unconditionally secure social secret sharing scheme, IET Inform. Secur., 4 (2010), 202211. doi: 10.1049/ietifs.2009.0098. 
[21] 
T. Rabin and M. BenOr, Verifiable secret sharing and multiparty protocols with honest majority, in "21st Annual ACM Symposium on Theory of Computing, STOC,'' (1989), 7385. 
[22] 
A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612613. doi: 10.1145/359168.359176. 
[23] 
R. Steinfeld, H. X. Wang and J. Pieprzyk, Latticebased thresholdchangeability for standard shamir secretsharing schemes, in "10th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT,'' Springer, (2004), 170186. 
[24] 
D. R. Stinson and R. Z. Wei, Unconditionally secure proactive secret sharing scheme with combinatorial structures, in "6th Annual Int. Workshop on Selected Areas in Cryptography, SAC,'' Springer, (1999), 200214. 
[25] 
C. Tartary and H. X. Wang, Dynamic threshold and cheater resistance for shamir secret sharing scheme, in "2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt,'' Springer, (2006), 103117. doi: 10.1007/11937807_9. 
show all references
References:
[1] 
S. G. Barwick, W. A. Jackson and K. M. Martin, Updating the parameters of a threshold scheme by minimal broadcast, IEEE Trans. Inform. Theory, 51 (2005), 620633. doi: 10.1109/TIT.2004.840857. 
[2] 
D. Beaver, Multiparty protocols tolerating half faulty processors, in "9th Annual International Cryptology Conference, CRYPTO,'' Springer, (1989), 560572. 
[3] 
M. BenOr, S. Goldwasser and A. Wigderson, Completeness theorems for noncryptographic faulttolerant distributed computation, in "20th Annual ACM Symposium on Theory of Computing, STOC,'' (1988), 110. 
[4] 
B. Blakley, G. R. Blakley, A. H. Chan and J. L. Massey, Threshold schemes with disenrollment, in "CRYPTO,'' (1992), 540548. 
[5] 
G. R. Blakley, Safeguarding cryptographic keys, in "National Computer Conference,'' AFIPS Press, (1979), 313317. 
[6] 
C. Blundo, A. Cresti, A. De Santis and U. Vaccaro, Fully dynamic secret sharing schemes, Theoret. Comp. Sci., 165 (1996), 407440. 
[7] 
B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in "26th Annual IEEE Symposium on Foundations of Computer Science, FOCS,'' (1985), 383395. 
[8] 
P. D'Arco and D. R. Stinson, On unconditionally secure robust distributed key distribution centers, in "8th Int. Conf. on the Theory and Application of Cryptology and Info. Security, ASIACRYPT,'' Springer, (2002), 346363. 
[9] 
Y. Desmedt and S. Jajodia, Redistributing secret shares to new access structures and its applications, in "Technical Report ISSE TR9701,'' George Mason Univ., 1997. 
[10] 
R. Gennaro, Y. Ishai, E. Kushilevitz and T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in "33th Annual ACM Symposium on Theory of Computing, STOC,'' (2001), 580589. 
[11] 
R. Gennaro, M. O. Rabin and T. Rabin, Simplified vss and fasttrack multiparty computations with applications to threshold cryptography, in "17th annual ACM symposium on Principles of Distributed Computing, PODC,'' (1998), 101111. 
[12] 
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, in "15th Annual International Cryptology Conference, CRYPTO,'' Springer, (1995), 339352. 
[13] 
I. Ingemarsson and G. J. Simmons, A protocol to set up shared secret schemes without the assistance of a mutualy trusted party, in "EUROCRYPT'' (I. Damgård), Springer, (1990), 266282. 
[14] 
W.A. Jackson, K. M. Martin and C. M. O'Keefe, Mutually trusted authorityfree secret sharing schemes, J. Cryptology, 10 (1997), 261289. doi: 10.1007/s001459900031. 
[15] 
A. Maeda, A. Miyaji and M. Tada, Efficient and unconditionally secure verifiable threshold changeable scheme, in "6th Australasian Conference Information Security and Privacy, ACISP,'' Springer, (2001), 403416. 
[16] 
K. Martin, Dynamic access policies for unconditionally secure secret sharing schemes, in "Proceedings of IEEE Information Theory Workshop (ITW 2005),'' IEEE, (2005), 6166. 
[17] 
K. M. Martin, J. Pieprzyk, R. SafaviNaini and H. X. Wang, Changing thresholds in the absence of secure channels, in "4th Australasian Conference Information Security and Privacy, ACISP,'' Springer, (1999), 177191. 
[18] 
K. M. Martin, R. SafaviNaini and H. X. Wang, Bounds and techniques for efficient redistribution of secret shares to new access structures, Computer J., 42 (1999), 638649. 
[19] 
V. Nikov and S. Nikova, On proactive secret sharing schemes, in "11th International Workshop on Selected Areas in Cryptography, SAC,'' Springer, (2004), 308325. 
[20] 
M. Nojoumian, D. R. Stinson and M. Grainger, Unconditionally secure social secret sharing scheme, IET Inform. Secur., 4 (2010), 202211. doi: 10.1049/ietifs.2009.0098. 
[21] 
T. Rabin and M. BenOr, Verifiable secret sharing and multiparty protocols with honest majority, in "21st Annual ACM Symposium on Theory of Computing, STOC,'' (1989), 7385. 
[22] 
A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612613. doi: 10.1145/359168.359176. 
[23] 
R. Steinfeld, H. X. Wang and J. Pieprzyk, Latticebased thresholdchangeability for standard shamir secretsharing schemes, in "10th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT,'' Springer, (2004), 170186. 
[24] 
D. R. Stinson and R. Z. Wei, Unconditionally secure proactive secret sharing scheme with combinatorial structures, in "6th Annual Int. Workshop on Selected Areas in Cryptography, SAC,'' Springer, (1999), 200214. 
[25] 
C. Tartary and H. X. Wang, Dynamic threshold and cheater resistance for shamir secret sharing scheme, in "2nd SKLOIS Conference on Information Security and Cryptology, Inscrypt,'' Springer, (2006), 103117. doi: 10.1007/11937807_9. 
[1] 
Bagher Bagherpour, Shahrooz Janbaz, Ali Zaghian. Optimal information ratio of secret sharing schemes on Dutch windmill graphs. Advances in Mathematics of Communications, 2019, 13 (1) : 8999. doi: 10.3934/amc.2019005 
[2] 
Ryutaroh Matsumoto. Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields. Advances in Mathematics of Communications, 2019, 13 (1) : 110. doi: 10.3934/amc.2019001 
[3] 
Stefka Bouyuklieva, Zlatko Varbanov. Some connections between selfdual codes, combinatorial designs and secret sharing schemes. Advances in Mathematics of Communications, 2011, 5 (2) : 191198. doi: 10.3934/amc.2011.5.191 
[4] 
Alar Leibak. On the number of factorizations of $ t $ mod $ N $ and the probability distribution of DiffieHellman secret keys for many users. Advances in Mathematics of Communications, 2021 doi: 10.3934/amc.2021029 
[5] 
Neal Koblitz, Alfred Menezes. Another look at security definitions. Advances in Mathematics of Communications, 2013, 7 (1) : 138. doi: 10.3934/amc.2013.7.1 
[6] 
Isabelle Déchène. On the security of generalized Jacobian cryptosystems. Advances in Mathematics of Communications, 2007, 1 (4) : 413426. doi: 10.3934/amc.2007.1.413 
[7] 
Razvan Mosincat, Haewon Yoon. Unconditional uniqueness for the derivative nonlinear Schrödinger equation on the real line. Discrete and Continuous Dynamical Systems, 2020, 40 (1) : 4780. doi: 10.3934/dcds.2020003 
[8] 
Andreas Kreuml. The anisotropic fractional isoperimetric problem with respect to unconditional unit balls. Communications on Pure and Applied Analysis, 2021, 20 (2) : 783799. doi: 10.3934/cpaa.2020290 
[9] 
Juliang Zhang, Jian Chen. Information sharing in a maketostock supply chain. Journal of Industrial and Management Optimization, 2014, 10 (4) : 11691189. doi: 10.3934/jimo.2014.10.1169 
[10] 
Dan Mangoubi. A gradient estimate for harmonic functions sharing the same zeros. Electronic Research Announcements, 2014, 21: 6271. doi: 10.3934/era.2014.21.62 
[11] 
Rafael Bravo De La Parra, Luis Sanz. A discrete model of competing species sharing a parasite. Discrete and Continuous Dynamical Systems  B, 2020, 25 (6) : 21212142. doi: 10.3934/dcdsb.2019204 
[12] 
Osman Palanci, Mustafa Ekici, Sirma Zeynep Alparslan Gök. On the equal surplus sharing interval solutions and an application. Journal of Dynamics and Games, 2021, 8 (2) : 139150. doi: 10.3934/jdg.2020023 
[13] 
Palash Sarkar, Subhadip Singha. Verifying solutions to LWE with implications for concrete security. Advances in Mathematics of Communications, 2021, 15 (2) : 257266. doi: 10.3934/amc.2020057 
[14] 
Roberto Civino, Riccardo Longo. Formal security proof for a scheme on a topological network. Advances in Mathematics of Communications, 2021 doi: 10.3934/amc.2021009 
[15] 
Riccardo Aragona, Alessio Meneghetti. Typepreserving matrices and security of block ciphers. Advances in Mathematics of Communications, 2019, 13 (2) : 235251. doi: 10.3934/amc.2019016 
[16] 
Archana Prashanth Joshi, Meng Han, Yan Wang. A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 2018, 1 (2) : 121147. doi: 10.3934/mfc.2018007 
[17] 
Philip Lafrance, Alfred Menezes. On the security of the WOTSPRF signature scheme. Advances in Mathematics of Communications, 2019, 13 (1) : 185193. doi: 10.3934/amc.2019012 
[18] 
Luiz Gustavo Farah. Local solutions in Sobolev spaces and unconditional wellposedness for the generalized Boussinesq equation. Communications on Pure and Applied Analysis, 2009, 8 (5) : 15211539. doi: 10.3934/cpaa.2009.8.1521 
[19] 
Jian Su, Yinnian He. The almost unconditional convergence of the Euler implicit/explicit scheme for the three dimensional nonstationary NavierStokes equations. Discrete and Continuous Dynamical Systems  B, 2017, 22 (9) : 34213438. doi: 10.3934/dcdsb.2017173 
[20] 
Jong Soo Kim, Won Chan Jeong. A model for buyer and supplier coordination and information sharing in orderupto systems. Journal of Industrial and Management Optimization, 2012, 8 (4) : 9871015. doi: 10.3934/jimo.2012.8.987 
2020 Impact Factor: 0.935
Tools
Metrics
Other articles
by authors
[Back to Top]