Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation

After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

[1]  Kim-Kwang Raymond Choo A Conceptual Interdisciplinary Plug-and-Play Cyber Security Framework , 2014 .

[2]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[3]  Michail Matthaiou,et al.  Hybrid millimeter-wave systems: a novel paradigm for hetnets , 2015, IEEE Communications Magazine.

[4]  Rajiv Ranjan,et al.  An integrated static detection and analysis framework for android , 2016, Pervasive Mob. Comput..

[5]  Kun Peng Critical survey of existing publicly verifiable secret sharing schemes , 2012, IET Inf. Secur..

[6]  Ron Steinfeld,et al.  Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes , 2007, IEEE Trans. Inf. Theory.

[7]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Ron Steinfeld,et al.  Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..

[10]  Dieter Gollmann,et al.  Key Escrow in Mutually Mistrusting Domains , 1996, Security Protocols Workshop.

[11]  Houbing Song,et al.  A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Communication Systems , 2011, 2011 IEEE International Conference on Communications (ICC).

[12]  Yeow Meng Chee,et al.  Threshold changeable secret sharing schemes revisited , 2012, Theor. Comput. Sci..

[13]  Xiaohui Tao,et al.  ICTs and the Millennium Development Goals: A United Nations Perspective , 2014 .

[14]  Josef Pieprzyk,et al.  Changing Thresholds in the Absence of Secure Channels , 1999, Aust. Comput. J..

[15]  Houbing Song,et al.  Cyber-physical systems for water sustainability: challenges and opportunities , 2015, IEEE Communications Magazine.

[16]  Douglas R. Stinson,et al.  On dealer-free dynamic threshold schemes , 2013, Adv. Math. Commun..

[17]  Lein Harn,et al.  Dynamic threshold secret reconstruction and its application to the threshold cryptography , 2015, Inf. Process. Lett..

[18]  Reihaneh Safavi-Naini,et al.  Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures , 1999, Comput. J..

[19]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[20]  Alfredo De Santis,et al.  Fully Dynamic Secret Sharing Schemes , 1993, Theor. Comput. Sci..

[21]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[22]  Enzo Baccarelli,et al.  Energy-efficient adaptive networked datacenters for the QoS support of real-time applications , 2014, The Journal of Supercomputing.

[23]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[24]  Saba Asaad,et al.  A lattice-based threshold secret sharing scheme , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.

[25]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[26]  Jinjun Chen,et al.  A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..

[27]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[28]  Sushil Jajodia,et al.  Redistributing Secret Shares to New Access Structures and Its Applications , 1997 .

[29]  Keith M. Martin,et al.  Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.

[30]  Huaxiong Wang,et al.  Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme , 2006, Inscrypt.

[31]  P. S. Avadhani,et al.  A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol , 2013, 2013 10th International Conference on Information Technology: New Generations.

[32]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[33]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[34]  Al-Sakib Khan Pathan,et al.  Securing Cyber-Physical Systems , 2015 .

[35]  Chi-Sung Laih,et al.  Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space , 1989, CRYPTO.

[36]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[37]  Mark Lomas Security Protocols International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings , 1997 .

[38]  Feng Wang,et al.  Dynamic threshold changeable multi-policy secret sharing scheme , 2015, Secur. Commun. Networks.

[39]  Gilles Brassard,et al.  Advances in Cryptology — CRYPTO’ 89 Proceedings , 2001, Lecture Notes in Computer Science.