Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation

Despite the information theoretic security of Shamir Secret Sharing Scheme and the ideality of Verifiable Secret Sharing Scheme in ensuring the honesty of a dealer of the shared secret and the shared secret itself, the detection and removal of an adversary posing as shareholder is still an open problem due to the fact that most of the studies are computationally and communicationally complex. This paper proposes a verifiable secret sharing scheme using a simple subset sum theory in monitoring and removing compromised shareholder in a secure multiparty computation. An analysis shows that the scheme cost minimal computational complexity of O(n) on the worst-case scenario and a variable-length communication cost depending on the length of the subset and the value of n.

[1]  Khin Mi Mi Aung,et al.  Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation , 2016, 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI).

[2]  G. Sadashivappa,et al.  Secure multi-party computation protocol using asymmetric encryption , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[3]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[4]  Mourad Debbabi,et al.  Protocols for secure multi-party private function evaluation , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).

[5]  Ziba Eslami,et al.  Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata , 2017, IACR Cryptol. ePrint Arch..

[6]  Sonja Filiposka,et al.  Parallel implementation of the modified subset sum problem in CUDA , 2014, 2014 22nd Telecommunications Forum Telfor (TELFOR).

[7]  Jieqing Ai,et al.  A tightly secure multi-party-signature protocol in the plain model , 2015, 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI).

[8]  Mbarek Marwan,et al.  Applying secure multi-party computation to improve collaboration in healthcare cloud , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).

[9]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[10]  George Thomas,et al.  A novel mathematical model for group communication with trusted key generation and distribution using shamir's secret key and USB security , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[11]  Aniket Kate,et al.  Computational Verifiable Secret Sharing Revisited , 2011, ASIACRYPT.

[12]  Lein Harn,et al.  Fair secret reconstruction in (t, n) secret sharing , 2015, J. Inf. Secur. Appl..

[13]  Masahiro Fujita,et al.  Efficient sum-to-one subsets algorithm for logic optimization , 1992, [1992] Proceedings 29th ACM/IEEE Design Automation Conference.

[14]  Ueli Maurer,et al.  Anonymous Authentication with Shared Secrets , 2014, LATINCRYPT.

[15]  Peijian Ju,et al.  Subset-sum based relay selection for multipath TCP in cooperative LTE networks , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[16]  Kevin C. Almeroth,et al.  Trust 2.0: Who to believe in the flood of online data? , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[17]  K. Nimmy Novel multi-server authentication protocol using secret sharing , 2016, 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE).