Publicly verifiable secret sharing scheme and its application with almost optimal information rate

It is well known that the construction of publicly verifiable secret sharing scheme with high information rate is a challenge. The information rates of the existing schemes are generally less than one-half; for this problem, we put forward a publicly verifiable secret sharing scheme with almost optimal information rate based on multilinear Diffie–Hellman assumption. First, we construct a knowledge commitment scheme by using multilinear map; on the basis of this scheme, we propose a publicly verifiable secret sharing scheme whose information rate is (m − 1)/m (The secret is (m − 1)-dimensional vector), which is almost asymptotically optimal. Second, the public verifiability of the scheme is achieved by using the multiple linear property of a multilinear map. Again, under multilinear Diffie–Hellman assumption, we proved the security of our scheme. And we apply our publicly verifiable secret sharing scheme to public-key encryption system skillfully. At last, the performance analysis results show the effectiveness and practicality of our scheme. Copyright © 2017 John Wiley & Sons, Ltd.

[1]  Tatsuaki Okamoto,et al.  A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications , 1998, EUROCRYPT.

[2]  Brent Waters,et al.  Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.

[3]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[4]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .

[5]  Mehdi Tibouchi,et al.  Cryptanalysis of GGH15 Multilinear Maps , 2016, CRYPTO.

[6]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[7]  Ron Steinfeld,et al.  GGHLite: More Efficient Multilinear Maps from Ideal Lattices , 2014, IACR Cryptol. ePrint Arch..

[8]  Jie Zhang,et al.  Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications , 2015, Future Gener. Comput. Syst..

[9]  Guoping Jiang,et al.  A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  Changgen Peng,et al.  A practical publicly verifiable secret sharing scheme based on bilinear pairing , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[12]  Jean-Sébastien Coron,et al.  Practical Multilinear Maps over the Integers , 2013, CRYPTO.

[13]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[14]  Yuh-Min Tseng,et al.  Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..

[15]  Yun Song,et al.  The optimal information rate of perfect secret sharing schemes , 2011, 2011 International Conference on Business Management and Electronic Information.

[16]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[17]  Ernest F. Brickell,et al.  On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.

[18]  Brice Minaud,et al.  Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.

[19]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[20]  Mahabir Prasad Jhanwar,et al.  Paillier-based publicly verifiable (non-interactive) secret sharing , 2014, Des. Codes Cryptogr..

[21]  Mihir Bellare,et al.  Verifiable partial key escrow , 1997, CCS '97.

[22]  Ilya Mironov,et al.  Publicly Verifiable Secret Sharing for Cloud-Based Key Management , 2011, INDOCRYPT.

[23]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[24]  Alfredo De Santis,et al.  On the size of shares for secret sharing schemes , 1991, Journal of Cryptology.

[25]  Joseph Y. Halpern,et al.  Ra-tional secret sharing and multiparty computation , 2004, STOC 2004.

[26]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[27]  Yongge Wang,et al.  Efficient secret sharing schemes achieving optimal information rate , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).