A Perfect Threshold Secret Sharing Scheme to Identify Cheaters Marco Carpentieri Designs, Codes and Cryptography 5(3):183-187, May 1995 Presented by Po-Kun.

Slides:



Advertisements
Similar presentations
Signatures for Network Coding Denis Charles Kamal Jain Kristin Lauter Microsoft Research.
Advertisements

Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
An Array-Based Algorithm for Simultaneous Multidimensional Aggregates By Yihong Zhao, Prasad M. Desphande and Jeffrey F. Naughton Presented by Kia Hall.
Secure Evaluation of Multivariate Polynomials
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Sub Exponential Randomize Algorithm for Linear Programming Paper by: Bernd Gärtner and Emo Welzl Presentation by : Oz Lavee.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Cryptographic Hash Functions Rocky K. C. Chang, February
Lecture 6  Calculating P n – how do we raise a matrix to the n th power?  Ergodicity in Markov Chains.  When does a chain have equilibrium probabilities?
Introduction to Modern Cryptography, Lecture 11 1) More about efficient computation: Montgomery arithmetic, efficient exponentiation 2)Secret Sharing schemes.
Ch12. Secret Sharing Schemes
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Prepared by Ilya Kolchinsky.  n generals, communicating through messengers  some of the generals (up to m) might be traitors  all loyal generals should.
1 Cryptography on weak BSS model of computation Ilir Çapuni
Short course on quantum computing Andris Ambainis University of Latvia.
Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
1 Adapted from Oded Goldreich’s course lecture notes.
Oblivious Transfer based on the McEliece Assumptions
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Chapter 7-1 Signature Schemes.
Secret Sharing Algorithms
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Factoring Algorithms Ref: D. Stinson, Cryptography - Theory and Practice, 2001.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
1 2 Introduction In this lecture we’ll cover: Definition of strings as functions and vice versa Error correcting codes Low degree polynomials Low degree.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
8. Data Integrity Techniques
How to play ANY mental game
An Efficient Identity-based Cryptosystem for
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Matrices CHAPTER 8.1 ~ 8.8. Ch _2 Contents  8.1 Matrix Algebra 8.1 Matrix Algebra  8.2 Systems of Linear Algebra Equations 8.2 Systems of Linear.
Lecture 3.4: Public Key Cryptography IV CS 436/636/736 Spring 2013 Nitesh Saxena.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Chapter 7 Advance Counting Techniques. Content Recurrence relations Generating function The principle of inclusion-exclusion.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
Brief Review Probability and Statistics. Probability distributions Continuous distributions.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Secure Computation Lecture Arpita Patra. Recap >Three orthogonal problems- (n,t)-sharing, reconstruction, multiplication protocol > Verifiable Secret.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Verifiable Distributed Oblivious Transfer and Mobile-agent Security Speaker: Sheng Zhong (joint work with Yang Richard Yang) Yale University.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation Michael Ben-Or Shafi Goldwasser Avi Wigderson Lecture: Mickey Hakimi.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
On the Size of Pairing-based Non-interactive Arguments
Block Wiedemann Algorithm
Advanced Protocols.
Elliptic Curves.
Threshold RSA Cryptography
Digital Signatures.
Secret Sharing: Linear vs. Nonlinear Schemes (A Survey)
A Novel Secret Sharing Scheme from Audio Perspective
Secret image sharing with steganography and authentication
Presentation transcript:

A Perfect Threshold Secret Sharing Scheme to Identify Cheaters Marco Carpentieri Designs, Codes and Cryptography 5(3): , May 1995 Presented by Po-Kun Chou 2002/4/22

Outline Introduction The Construction Properties

Introduction In 1979 Blakley and Shamir gave protocols to solve problem known as “(k,n) Threshold Secret Sharing” A threshold secret sharing is said to be unconditionally secure if the probability of successful cheating is limited to a specify probability even if the cheaters are assumed to have infinite computational resources. McEliece and Sarwate use an error-correcting code to construct a threshold secret sharing scheme in which any group of k+2e participants which includes at most e cheaters can correctly calculate the secret. Tompa and Woll’s scenario: Can detect cheating but cannot identify cheater.

Introduction(const) Brickell and Stinson’s modified version of the Blakley’s construction in which honest participants can identify cheaters. Rabin and Ben-Or’s scheme: Each participants P i in P receives his share d i and extra information which is n-1random elements V i,j,for j=1,..,n and j≠ i, each participant P j in P-{P i } receives n-1 pairs (W j,i,Z j,i ),for i=1,..,n and i ≠j,where W j,i ≠0 is a random element and Z j,i is calculated as Z j,i = d i + V i,j W j,i when P i wants to let P j know his share,he returns the pair (d i,V i,j ),then P j can calculate d i + V i,j W j,i and he accepts d i only if the result is Z j,i. In this paper we present a perfect and unconditionally secure (k,n) threshold secret sharing scheme having the same properties of Rabin and Ben-Or’s scheme,but in which the information given to each participant is smaller(k+2(n-1) elements of a finite field).

The Construction S is the secret chosen in the finite field GF(q) by the Dealer(Dl) When Dl wants share S among participants in P,Dl gives a k- dimensional vector d i ≡ (d i,0, d i,1,…,d i,k-1 ),k ≦ n over GF(q) as a share to participant P i,for i=1,…,n. Dl chooses the shares: a 1,a 2,…,a k-1 :participants unknow α 1, α 2,…,α n :participants know q(x)=S+ a 1 x+ a 2 x 2 +…+a k-1 x k-1,then d i,0 =q(α i ) and d i,1,…,d i,k-1 are random chosen uniformly at random in GF(q),for i=1,..,n. To guard against cheating,Dl distributes”extra information” which consists of n-1 pairs of elements in GF(q) for each P j in P to the participants along with their shares.

The Construction(const) Dl calculate b j,i =g j,i d i,0 +α j d i,1 +…+α j k-1 d i,k-1 and he gives P j the pair (g j,i, b j,i ),for i=1,..,n and i ≠j and g j,i be non null elements chosen uniformly at random in GF(q). When P i returns his share d i, P j can check the authenticity of d i by verifying that it is a solution vector of the equation g j,i y 0 +α j y 1 +…+α j k-1 y k-1 = b j,i,where y 0,y 1,…y k-1 are the unknows, g j,i,α j,… α j k- 1 are the coefficients and b j,i is the constant,for i=1,…,n and i ≠j.

Properties Lemma 1: Any k participants can calculate the secret S,but no subset of fewer than k participants can determine any partial information regarding s Lemma 2: Any participant who attempts to cheat will be identified by any honest participant with probability 1 – [1/(q-1)]

Properties(const) Lemma 3: Even if there is only one honest participant and the remaining n-1 participants form a coalition in order to deceive him,their probability of cheating successfully is only 1-(1-[1/(q-1)]) n-k+1 ≦ (n-k+1)/(q-1) Lemma 4: The secret information given to each participant consists of k+2(n-1) elements of the finite field GF(q).

Properties(const) Lemma 5: The construction can be implemented in polynomial time

~The end~

Rabin and Ben-Or’s scheme P i : 1.share: d i 2.extra information: n-1 random elements V i,j (j≠i) P j : n-1 pairs (W j,i,Z j,i ) and Z j,i = d i + V i,j W j,i P i 將 (d i,V i,j ) 送給 P j, 然後 P j 用已知的 (W j,i,Z j,i ) 驗證 P i 送的是否正確 For example: P 1 送 d 1 以及 V 1,2,V 1,3 給 P 2,P 3 P 1 : P 2 : P 3 : d 1 =3 W 2,1 =4 W 3,1 =5 V 1,2 =5 Z 2,1 =23 Z 3,1 =13 V 1,3 =2 23=3+5*4 13=3+2*5

Marco Carpentieri’s scheme Dl: 1. k-dimensional vector d i ≡ (d i,0, d i,1,…,d i,k-1 ),k ≦ n 2. a 1,a 2,…,a k-1 :participants unknow 3. α 1, α 2,…,α n :participants know 4. q(x)=S+ a 1 x+ a 2 x 2 +…+a k-1 x k-1 => S 為 secret 5. d i,0 =q(α i ) and d i,1,…,d i,k-1 are random chosen 6.Calculate b j,i =g j,i d i,0 +α j d i,1 +…+α j k-1 d i,k-1 7.Gives P i : d i 8.Gives P j : n-1 pairs (b j,i,g j,i ) P i : gives P j his share d i P j : verifying if g j,i d i,0 +α j d i,1 +…+α j k-1 d i,k-1 = b j,i

Properties Lemma 1: Any k participants can calculate the secret S,but no subset of fewer than k participants can determine any partial information regarding s =>because there are q k-r-1 possible solutions (r<k) Lemma 2: Any participant who attempts to cheat will be identified by any honest participant with probability 1 – [1/(q-1)] =>because only one of the possible equations that the participant P j could have to check the share of P i

Properties(const) Lemma 3: Even if there is only one honest participant and the remaining n-1 participants form a coalition in order to deceive him,their probability of cheating successfully is only 1-(1-[1/(q-1)]) n-k+1 ≦ (n-k+1)/(q-1) Lemma 4: The secret information given to each participant consists of k+2(n-1) elements of the finite field GF(q). =>because each participant receives k elements of GF(q) as his share and 2(n-1) elements of extra information

Properties(const) Lemma 5: The construction can be implemented in polynomial time =>Dl calculates the power of α j in k(k-1)/2 multiplications. then the constants b j,i are calculated in k(n-1) multiplications.Dl needs k(k-1)/2+n(k-1)multiplications.