A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution

In this paper we introduce a multi secret sharing (MSS) scheme based on lattice conception. Lattice constitutes the core of many cryptographic constructions. The advantage of using lattice, which our scheme will inherit, is twofold: first is that the hardness of lattice problems is well understood. We will show that breaking our scheme leads to a solution for the robust Short Integer Solution problem. Hence, the presented scheme’s security is guaranteed by leveraging lattice based conceptions. Second advantage is that working with lattice is simple and, consequently, execution is fast. A main problem with previous schemes is that they mostly are based on numerical assumptions which are slow and need much throughput. Inheriting simplicity and fastness make our scheme an excellent choice to implement in facilities with limit computational power and resources. In secret sharing schemes, typically in any protocol, dishonest participants and dealer can cheat during execution. To mitigate these concerns we augment our scheme with verifiability properties, say verifiable and public verifiable secret sharing. Verifiability prevents the dealer to share wrong shares and public verifiability forces participants to submit their sub-shares correctly. In MSS schemes, releasing some public values which are used in recovering step is inevitable. At the end, a comprehensive comparison by a table in the conclusion section shows that the presented scheme has minimum number of public values among MSS schemes.

[1]  Ron Steinfeld,et al.  Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2004, IEEE Transactions on Information Theory.

[2]  Dan Boneh,et al.  Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.

[3]  Duncan S. Wong,et al.  Practical Distributed Signatures in the Standard Model , 2014, CT-RSA.

[4]  Yanhong Liu,et al.  Attacks to some verifiable multi-secret sharing schemes and two improved schemes , 2016, Inf. Sci..

[5]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[6]  Vadim Lyubashevsky,et al.  Lattice-Based Identification Schemes Secure Under Active Attacks , 2008, Public Key Cryptography.

[7]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[8]  Hung-Min Sun,et al.  Digital multisignature schemes for authenticating delegates in mobile code systems , 2000, IEEE Trans. Veh. Technol..

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[11]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[12]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[13]  Shafi Goldwasser,et al.  Complexity of lattice problems , 2002 .

[14]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[15]  Vinod Vaikuntanathan,et al.  Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.

[16]  Oded Regev,et al.  Lattice-Based Cryptography , 2006, CRYPTO.

[17]  Chuntian Cheng,et al.  An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme , 2005, WAIM.

[18]  Mohammed Meziani,et al.  An Efficient Lattice-Based Secret Sharing Construction , 2012, WISTP.

[19]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[20]  Ziba Eslami,et al.  A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps , 2012, Wirel. Pers. Commun..

[21]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[22]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[23]  Massoud Hadian Dehkordi,et al.  New efficient and practical verifiable multi-secret sharing schemes , 2008, Inf. Sci..

[24]  Keisuke Tanaka,et al.  Multi-bit Cryptosystems Based on Lattice Problems , 2007, Public Key Cryptography.

[25]  Shafi Goldwasser,et al.  Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.

[26]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[27]  Wei-Pang Yang,et al.  A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.

[28]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .

[29]  L. Harn,et al.  Comment on "Multistage secret sharing based on one-way function" , 1995 .