Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

[1]  László Babai,et al.  On Lovász’ lattice reduction and the nearest lattice point problem , 1986, Comb..

[2]  Amin Shokrollahi,et al.  List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.

[3]  Ron Steinfeld,et al.  Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..

[4]  Dan Boneh,et al.  Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.

[5]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[6]  F. Thorne,et al.  Geometry of Numbers , 2017, Algebraic Number Theory.

[7]  Maurice Mignotte,et al.  How to Share a Secret? , 1982, EUROCRYPT.

[8]  R. Kannan ALGORITHMIC GEOMETRY OF NUMBERS , 1987 .

[9]  Keith M. Martin,et al.  A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..

[10]  P. Shiu,et al.  Geometric and analytic number theory , 1991 .

[11]  Luisa Gargano,et al.  A Note on Secret Sharing Schemes , 1993 .

[12]  M. A. Tsfasman,et al.  Decoding of Algebraic-Geometric Codes , 1993, Proceedings. IEEE International Symposium on Information Theory.

[13]  Ron Steinfeld,et al.  Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2004, IEEE Transactions on Information Theory.

[14]  Sushil Jajodia,et al.  Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .

[15]  Igor E. Shparlinski,et al.  Noisy Chinese remaindering in the Lee norm , 2004, J. Complex..

[16]  Keith M. Martin,et al.  Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.

[17]  Igor E. Shparlinski,et al.  Sparse polynomial approximation in finite fields , 2001, STOC '01.

[18]  Josef Pieprzyk,et al.  Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..

[19]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[20]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[21]  Alfredo De Santis,et al.  Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..

[22]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[23]  J. G. Pierce,et al.  Geometric Algorithms and Combinatorial Optimization , 2016 .

[24]  László Lovász,et al.  Factoring polynomials with rational coefficients , 1982 .

[25]  Reihaneh Safavi-Naini,et al.  Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures , 1999, Comput. J..

[26]  Bart Preneel,et al.  On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.

[27]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[28]  Dana Ron,et al.  Chinese remaindering with errors , 1999, STOC '99.

[29]  Atsuko Miyaji,et al.  Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme , 2001, ACISP.

[30]  Ravi Kumar,et al.  A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.

[31]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[32]  J. Rosser,et al.  Approximate formulas for some functions of prime numbers , 1962 .