Fair hierarchical secret sharing scheme based on smart contract

Abstract Secret sharing has a number of practical applications in network-based scenarios, such as key transfer protocols, attribute-based encryption and secure multiparty computation. However, existing secret sharing schemes cannot efficiently achieve fairness. They either rely on a trusted third party or require multiple rounds of communication. In this paper, we propose the first decentralized and fair hierarchical threshold secret sharing (HTSS) scheme using blockchain. In the scheme, secret shares are distributed to different levels of parties, and any authorized subset of parties can obtain the secret. We leverage a smart contract to force all participants to commit to the secret shares; otherwise, the committer either reveals his secret share within a certain time frame or pays a fine. Thus, unlike previous HTSS schemes, the participants can reconstruct the secret fairly using Birkhoff interpolation without a trusted party and complete the computation in one round. We formally prove that our scheme is secure. We evaluate the performance of the scheme by implementing our scheme on Ethereum’s official test network. Our experiments show that our scheme can run reasonably fast and is practical.

[1]  Urszula Ogiela,et al.  Visual CAPTCHA application in linguistic cryptography , 2018, Concurr. Comput. Pract. Exp..

[2]  Changyu Dong,et al.  Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing , 2017, CCS.

[3]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD , 2018, J. Vis. Commun. Image Represent..

[4]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[7]  Carles Padró,et al.  Ideal Hierarchical Secret Sharing Schemes , 2010, IEEE Transactions on Information Theory.

[8]  En Zhang,et al.  Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks , 2013, Int. J. Found. Comput. Sci..

[9]  Saikrishna Badrinarayanan,et al.  Revisiting Non-Malleable Secret Sharing , 2019, IACR Cryptol. ePrint Arch..

[10]  Yanjiao Chen,et al.  CReam: A Smart Contract Enabled Collusion-Resistant e-Auction , 2019, IEEE Transactions on Information Forensics and Security.

[11]  Lein Harn,et al.  Fair secret reconstruction in (t, n) secret sharing , 2015, J. Inf. Secur. Appl..

[12]  Dongdai Lin,et al.  Bayesian mechanism for rational secret sharing scheme , 2015, Science China Information Sciences.

[13]  Ming Li,et al.  Outsourcing secret sharing scheme based on homomorphism encryption , 2018, IET Inf. Secur..

[14]  Vipul Goyal,et al.  Non-malleable secret sharing , 2018, IACR Cryptol. ePrint Arch..

[15]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[16]  Marek R. Ogiela,et al.  Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.

[17]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes , 2018, Signal Process. Image Commun..

[18]  Yanhong Liu,et al.  Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..

[19]  Marek R. Ogiela,et al.  Security of visual codes in service management in the cloud , 2017, 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS).

[20]  Yali Liu,et al.  Double verification protocol via secret sharing for low-cost RFID tags , 2019, Future Gener. Comput. Syst..

[21]  Ziba Eslami,et al.  Distributed key generation protocol with hierarchical threshold access structure , 2015, IET Inf. Secur..

[22]  P ArockiaJansiRani,et al.  Hierarchical threshold secret sharing scheme for color images , 2017 .

[23]  Brad A. Myers,et al.  Smarter Smart Contract Development Tools , 2019, 2019 IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).

[24]  Peiyan Yuan,et al.  Verifiable Rational Secret Sharing Scheme in Mobile Networks , 2015, Mob. Inf. Syst..

[25]  Taraneh Eghlidos,et al.  An Efficient Lattice Based Multi-Stage Secret Sharing Scheme , 2017, IEEE Transactions on Dependable and Secure Computing.

[26]  Zhihui Li,et al.  A dynamic multiparty quantum direct secret sharing based on generalized GHZ states , 2018, Quantum Inf. Process..

[27]  Fenghua Li,et al.  Server-aided private set intersection based on reputation , 2017, Inf. Sci..

[28]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.