Some New Issues on Secret Sharing Schemes

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Ch12. Secret Sharing Schemes
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Seminar in Foundations of Privacy 1.Adding Consistency to Differential Privacy 2.Attacks on Anonymized Social Networks Inbal Talgam March 2008.
Social Choice Theory By Shiyan Li. History The theory of social choice and voting has had a long history in the social sciences, dating back to early.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Secret Sharing Algorithms
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering,
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF.
Secure Computation Lecture Arpita Patra. Recap > Shamir Secret-sharing > BGW Protocol based on secret-sharing > Offline/Online phase > Creating.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
Secret Sharing Non-Shannon Information Inequalities Presented in: Theory of Cryptography Conference (TCC) 2009 Published in: IEEE Transactions on Information.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
A general (k, n) scalable secret image sharing scheme with the smooth scalability Ching-Nung Yang, Yu-Ying Chu The Journal of Systems and Software 84 (2011)
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Linear, Nonlinear, and Weakly-Private Secret Sharing Schemes
Secret Sharing Schemes In cryptography, secret sharing schemes refers to any method for distributing a secret among a group of participants, each of which.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Computing Shapley values, manipulating value division schemes, and checking core membership in multi-issue domains Vincent Conitzer, Tuomas Sandholm Computer.
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
CSE 311: Foundations of Computing Fall 2013 Lecture 9: Set theory and functions.
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm Miaoqing Huang Nov. 5, 2010.
Cryptographic Protocols Secret sharing, Threshold Security
Secret Sharing in a Multidisciplinary Model
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
A Simple Provably Secure AKE from the LWE Problem
Perfect Secret Sharing Schemes
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Ch12. Secret Sharing Schemes
Advanced Protocols.
Wavelets : Introduction and Examples
Sindhusha Doddapaneni
Improving Lamport One-time Signature Scheme
Fuzzy Identity Based Encryption
5.5 Properties of the Definite Integral
Source: Signal Processing 109 (2015) 317–333
Aapo Hyvärinen and Ella Bingham
Secret Sharing Schemes using Visual Cryptography
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Improved Visual Secret Sharing Scheme for QR Code Applications
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Threshold RSA Cryptography
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Masayuki Fukumitsu Hokkaido Information University, Japan
Key Establishment Protocols ~
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Secret Sharing: Linear vs. Nonlinear Schemes (A Survey)
A Secret Enriched Visual Cryptography
A Novel Secret Sharing Scheme from Audio Perspective
One Time Signature.
Cryptology Design Fundamentals
Optimal XOR based (2,n)-Visual Cryptography Schemes
Reporter: Wenkai Cui Institution: Tsinghua University Date:
A Note on Secure Key Issuing in ID-based Cryptography
Secret Image Sharing Based on Encrypted Pixels
Cryptographic Protocols Secret Sharing, Threshold Security
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Some New Issues on Secret Sharing Schemes In The Name of Allah Some New Issues on Secret Sharing Schemes Mohammad Ehdaie mohammad@ehdaie.com Taraneh Eghlidos teghlidos@sharif.edu Mohammad Reza Aref aref@sharif.edu Sharif University of Technology, Tehran, I.R.Iran

M. Ehdaie, T. Eghlidos, M.R. Aref Contents Introduction Preliminaries A New (2, n) Audio Secret Sharing Scheme Extension to a (2m, 4m) Scheme Extension to a (k, n) Scheme Discussions and Results Conclusions References Q & A Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Secret Sharing Definition: Secret sharing is a method to distribute a secret between some participants such that particular subsets (i.e. authorized subsets) could obtain the secret, whereas unauthorized subsets could not. Significance: The risk of fully authorizing a person The risk of Information Disruption Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Terminology Threshold Scheme Cardinality of all minimum allowed subsets, k, is constant. Perfect Scheme Unauthorized subsets could not get any information about the secret by pooling their shares together. Ideal Scheme The size of each share is equal to the size of the secret. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref The History Geometric Scheme, Blakley, 1979 Interpolation Scheme, Shamir, 1979 … Visual Secret Sharing, Naor & Shamir, 1994 Audio Secret Sharing, Desmedt et al., 1998 Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Motivation What is an Audio Secret Sharing Scheme (ASSS)? Audio Shares and/or Audio Secret Why? Audio Applications … Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Preliminaries The audio file F corresponds to an Amplitude Vector A. The human audio system is insensitive to the phase of the signal (e.g. amplitude vector –A corresponds to an audio file which is same to F). Playing two audio files simultaneously, leads to an audio file which corresponds to the sum of their corresponding vectors (The Interference Property). The Sign Properties: The amplitude vector Sign(A) corresponds to an audio file which is the noisy version of F. The amplitude vector B, where Sign(B) = Sign(A), corresponds to an audio file which is the noisy version of F. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Setup Divide the audio secret file into some small intervals. Generate the shares in each interval independently. Put all share parts of each participant together and generate an audio share. A: The amplitude vector of the secret file. S1, S2, …, Sn: The amplitude vectors of the n share files. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Shares Generation For all elements of the secret amplitude vector, A: Select a random real number, xt, secretly, such that xt>>n. For i, 1 ≤ i ≤ n, generate Si,t as: Finally, distribute the files correspond to S1,S2, ... , Sn to n participants. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Secret Reconstruction (1) Lemma: Assume Pi and Pj, j > i, are two participants who want to reconstruct the secret. Set B equal to Sj-Si. Then we have Sign(B) = Sign(A). Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Secret Reconstruction (2) Proof: Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Security For every t, xt is a private number. Each participant Pi does not know whether his share in the tth interval is xt + i or xt − i. The sign of At is unknown to him. He could not get any information about the Sign(A). Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Simulation Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Extension to a (2m, 4m) Scheme (1) A (2, 4) scheme. A secret bit, b. Eight participants P1,P2,…,P8. Extension to a (4, 8) scheme. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Extension to a (2m, 4m) Scheme (2) Q1 = {P1, P2}, Q2 = {P3, P4}, Q3 = {P5, P6}, Q4 = {P7, P8} {Q1,Q2} , {Q3,Q4} {Q1,Q3} , {Q2,Q4} {Q1,Q4} , {Q2,Q4} For every four participants, there is a row i, 1 ≤ i ≤ 3, such that two participants could obtain bi,1 and two of them could get bi,2. P1, P6, P7 and P8 : P1 & P6  b2,1 P7 & P8  b2,2 b = b2,1 × b2,2 is revealed. Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Extension to a (k, n) Scheme (1) A (3, 7) Scheme: A (4, 8) Scheme Pass 7 Shares to 7 Participants Announce the 8th Share A (4, 7) Scheme: Destroy the 8th Share Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Extension to a (k, n) Scheme (2) Lemma: Assume we have a (t, m) threshold secret sharing scheme. Then, we could have a (k, n) threshold secret sharing scheme if the following assertions hold: i) k ≤ t ii) n ≤ m iii) t − k ≤ m − n Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Discussions and Results The Scheme DHQ LLY Primary Extended Threshold (2, n) (k, n) Perfect  Without Computation   Ideal Audio Shares Audio Secret Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Conclusions Contributions of Authors : A new audio secret sharing scheme Perfect (2, n) threshold scheme Audio shares and audio secret Ideal or Secret reconstruction without any computation Extending any (2, n) scheme to a (k, n) one Continuation of this research: A (k, n) scheme with all of the good properties Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref References Shamir A., "How to share a secret", Comm. ACM 22, pp. 612-613, (1979). Blakley G. R., "Safeguarding cryptographic keys", Proc. of the National Computer Conf., v. 48, pp. 242-268, (1979). Naor M., Shamir A., "Visual cryptography", Eurocrypt 94, pp. 1-12. Desmedt Y., Hou S., Quisquater J., "Audio and optical cryptography", in Advances in Cryptology-Asiacrypt ’98, Springer-Verlag LNCS, pp. 392-404. Lin C. C., Laih C. S., Yang C. N., "New Audio Secret Sharing Schemes With Time Division Technique", J. of Information Science and Engineering 19, 605-614 (2003). Tuesday, April 23, 2019Tuesday, April 23, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref