Robust Additive Secret Sharing Schemes over Zm

In a threshold secret sharing scheme, a dishonest participant can disrupt the operation of the system by submitting junk instead of his/her share. We propose two constructions for threshold secret sharing schemes that allow identification of cheaters where the secret is an element of the ringZ m . The main motivation of this work is to design RSA-based threshold cryptosystems, such as robust threshold RSA signature, in which additive (multiplicative) threshold secret sharing schemes over Abelian groups with cheater identification play the central role. The first construction extends Desmedt-Frankel’s construction of secret sharing over Z m to provide cheater detection, and the second construction uses perfect hash families to construct a robust (t, n) scheme from a (t, t) scheme. We prove security of these schemes and assess their performance.

[1]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[3]  Giovanni Di Crescenzo,et al.  Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography , 1994, ASIACRYPT.

[4]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[5]  Douglas R Stinson,et al.  Some recursive constructions for perfect hash families , 1996 .

[6]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[7]  Yvo Desmedt,et al.  Efficient Multiplicative Sharing Schemes , 1996, EUROCRYPT.

[8]  Alfred V. Aho,et al.  Data Structures and Algorithms , 1983 .

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Ernest F. Brickell,et al.  The Detection of Cheaters in Threshold Schemes , 1988, CRYPTO.

[11]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[12]  Clifford C. Cocks Split Knowledge Generation of RSA Parameters , 1997, IMACC.

[13]  Yvo Desmedt,et al.  Perfect Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group , 1994, SIAM J. Discret. Math..

[14]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[15]  Yair Frankel,et al.  A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.

[16]  Yvo Desmedt,et al.  A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group , 1998, ACISP.

[17]  Matthew K. Franklin,et al.  Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.

[18]  George Havas,et al.  Perfect Hashing , 1997, Theor. Comput. Sci..