@inproceedings{1baf8fdcab9b445a88762cccbe222351,
title = "On proactive secret sharing schemes",
abstract = "This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg{\textquoteright}s et al. imposing less restriction to the adversary. We first investigate the approach of using commitment to 0 in the renewal phase in order to renew the player{\textquoteright}s shares. In the considered model some well known computationally secure protocols (which use this approach) turns out to be vulnerable to a specific attack. We show that this type of attack is applicable also in the unconditional case. Then we extend the attack of D{\textquoteright}Arco and Stinson to non-symmetric polynomials, which is applicable even in the mobile adversary model of Herzberg et al. Next the conditions for the security of a proactive scheme using this approach are shown. We also investigate another approach to add proactivity, namely using re-sharing instead of commitment to 0. Two protocols using this approach are described and it is shown that both are not secure against a mobile adversary. The main contribution of the paper is to show specific weaknesses, when a mobile adversary is considered.",
author = "V.S. Nikov and S.I. Nikova",
year = "2005",
doi = "10.1007/978-3-540-30564-4\_22",
language = "English",
isbn = "3-540-24327-5",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "308--325",
editor = "H. Handschuh and M.A. Hasan",
booktitle = "Selected Areas in Cryptography (Proceedings 11th Annual Workshop, SAC 2004, Waterloo ON, Canada, August 9-10, 2004)",
address = "Germany",
}