On proactive secret sharing schemes

V.S. Nikov, S.I. Nikova

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

34 Citations (Scopus)

Abstract

This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player’s shares. In the considered model some well known computationally secure protocols (which use this approach) turns out to be vulnerable to a specific attack. We show that this type of attack is applicable also in the unconditional case. Then we extend the attack of D’Arco and Stinson to non-symmetric polynomials, which is applicable even in the mobile adversary model of Herzberg et al. Next the conditions for the security of a proactive scheme using this approach are shown. We also investigate another approach to add proactivity, namely using re-sharing instead of commitment to 0. Two protocols using this approach are described and it is shown that both are not secure against a mobile adversary. The main contribution of the paper is to show specific weaknesses, when a mobile adversary is considered.
Original languageEnglish
Title of host publicationSelected Areas in Cryptography (Proceedings 11th Annual Workshop, SAC 2004, Waterloo ON, Canada, August 9-10, 2004)
EditorsH. Handschuh, M.A. Hasan
Place of PublicationBerlin
PublisherSpringer
Pages308-325
ISBN (Print)3-540-24327-5
DOIs
Publication statusPublished - 2005

Publication series

NameLecture Notes in Computer Science
Volume3357
ISSN (Print)0302-9743

Fingerprint

Dive into the research topics of 'On proactive secret sharing schemes'. Together they form a unique fingerprint.

Cite this