Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model

Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is proposed to capture this situation. In the continual leakage model, the attacker can continuously leak the private value owned by the user with the constraint that the information leaked should be less than l between updates. We propose continual leakage-resilient dynamic secret sharing under split-state model in this paper. After a preprocessing stage, the dealer is able to dynamically choose a set of n users and to allow a threshold of t users to reconstruct different secrets in different time instants, by using the same broadcast message. The secrets are protected even if an adversary corrupts up to t−1 users and obtains continual leakage from the rest of them. Our scheme can provide the security for secret sharing under continual leakage model while at the same time allowing the users to join and quit the scheme dynamically.

[1]  Allison Bishop,et al.  Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.

[2]  Douglas R. Stinson,et al.  Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.

[3]  Yael Tauman Kalai,et al.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[4]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[5]  Ernest F. Brickell,et al.  Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.

[6]  Martijn Stam Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.

[7]  Alfredo De Santis,et al.  Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..

[8]  Siu-Ming Yiu,et al.  Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.

[9]  Mike Scott,et al.  Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number , 2002, IACR Cryptol. ePrint Arch..

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  Stefan Dziembowski,et al.  Leakage-Resilient Storage , 2010, SCN.

[12]  G. R. Blakley,et al.  Threshold Schemes with Disenrollment , 1992, CRYPTO.

[13]  Allison Bishop,et al.  Storing Secrets on Continually Leaky Devices , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[14]  David Pointcheval,et al.  Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.

[15]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[16]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[17]  Yael Tauman Kalai,et al.  Leakage-Resilient Coin Tossing , 2011, DISC.

[18]  Chi-Sung Laih,et al.  Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space , 1989, CRYPTO.

[19]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.