Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting secret by sharing it among multiple participants. In 1979, (t, n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t, n) threshold secret sharing scheme a secret can be shared among n participants such that t or more participants can reconstruct the secret, but it can not be reconstructed by t− 1 or fewer participants. The proposed schemes by Shamir and Blakley have some drawbacks. Multi-secret and verifiable schemes were invented to improve old schemes. We analysis the security of hash based secret sharing schemes, and show that the schemes have some drawbacks. In particular it is shown that the the schemes are not resistant against deceptive behavior by dealer and participants.

[1]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Felix Brandt,et al.  On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.

[4]  Aggelos Kiayias,et al.  Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections , 2010, Financial Cryptography.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Yanhong Liu,et al.  Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..

[7]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[8]  R. Cramer,et al.  Multiparty Computation, an Introduction , 2005 .

[9]  Stephen R. Tate,et al.  A Direct Anonymous Attestation Scheme for Embedded Devices , 2007, Public Key Cryptography.

[10]  Chi Sing Chum,et al.  Implementations of a Hash Function Based Secret Sharing Scheme , 2015 .

[11]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[12]  Jeong Hyun Yi,et al.  Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.

[13]  Xiaowen Zhang,et al.  Hash function-based secret sharing scheme designs , 2011, Secur. Commun. Networks.