Secret Sharing Schemes with Hidden Sets

Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that at least t shares are needed to reconstruct k, where 0\lt/p\gt\lt t \le n. Nothing about the secret can belearned from less than t shares...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE Symposium on Computers and Communications (ISCC) pp. 00713 - 00718
Main Authors de Souza, Rick Lopes, Vigil, Martin, Custodio, Ricardo, Caullery, Florian, Moura, Lucia, Panario, Daniel
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that at least t shares are needed to reconstruct k, where 0\lt/p\gt\lt t \le n. Nothing about the secret can belearned from less than t shares. To split secret k, the Dealer generates a polynomial f,whose independent term is k and the coefficients are randomly selected using a uniform distribution. A share is a pair ( x,f(x)) where x is also chosen randomly using a uniform distribution. This scheme is useful, for example, to distribute cryptographic keys among different cloud providers and to create multi-factor authentication. The security of Shamir's Secret Sharing Scheme is usually analyzed using a threat model where the Dealer is trusted to split and share secrets as described above. In this paper, we demonstrate that there exists a different threat model where a malicious Dealer can compute shares such that a subset of less than t shares is allowed to reconstruct the secret. We refer to such subsets as hidden sets. We formally define hidden sets and prove lower boundson the number of possible hidden sets for polynomials of degree t -1. Yet, we show how to detect hidden sets given a set of n shares and describe how to create hidden sets while sharing a secret using a modification of Shamir's scheme.
AbstractList Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that at least t shares are needed to reconstruct k, where 0\lt/p\gt\lt t \le n. Nothing about the secret can belearned from less than t shares. To split secret k, the Dealer generates a polynomial f,whose independent term is k and the coefficients are randomly selected using a uniform distribution. A share is a pair ( x,f(x)) where x is also chosen randomly using a uniform distribution. This scheme is useful, for example, to distribute cryptographic keys among different cloud providers and to create multi-factor authentication. The security of Shamir's Secret Sharing Scheme is usually analyzed using a threat model where the Dealer is trusted to split and share secrets as described above. In this paper, we demonstrate that there exists a different threat model where a malicious Dealer can compute shares such that a subset of less than t shares is allowed to reconstruct the secret. We refer to such subsets as hidden sets. We formally define hidden sets and prove lower boundson the number of possible hidden sets for polynomials of degree t -1. Yet, we show how to detect hidden sets given a set of n shares and describe how to create hidden sets while sharing a secret using a modification of Shamir's scheme.
Author Custodio, Ricardo
Vigil, Martin
Caullery, Florian
Moura, Lucia
de Souza, Rick Lopes
Panario, Daniel
Author_xml – sequence: 1
  givenname: Rick Lopes
  surname: de Souza
  fullname: de Souza, Rick Lopes
  organization: Universidade Federal de Santa Catarina, Brazil
– sequence: 2
  givenname: Martin
  surname: Vigil
  fullname: Vigil, Martin
  organization: Universidade Federal de Santa Catarina, Brazil
– sequence: 3
  givenname: Ricardo
  surname: Custodio
  fullname: Custodio, Ricardo
  organization: Universidade Federal de Santa Catarina, Brazil
– sequence: 4
  givenname: Florian
  surname: Caullery
  fullname: Caullery, Florian
  organization: DarkMatter LLC, United Arab Emirates
– sequence: 5
  givenname: Lucia
  surname: Moura
  fullname: Moura, Lucia
  organization: University of Ottawa, Canada
– sequence: 6
  givenname: Daniel
  surname: Panario
  fullname: Panario, Daniel
  organization: Carleton University, Canada
BookMark eNotj8FKxDAUACO4oK79APHSm6fW95K8NDlKUXdhwUP2viTN6zbiVmkL4t8ruKdhLgNzIy7Hz5GFuEOoEcE9bn3b1hLQ1paUJS0vROEai39ijCPAK1HM8zsASGOpQXMtHjx3Ey-lH8KUx2Ppu4FPPJffeRnKTU6Jx9LzMt-KVR8-Zi7OXIv9y_O-3VS7t9dt-7SrsoOlij1SikSSpIqhkUaqZAOixahUtCEZTD0k0KSDTikGkNE1SnZMwTSa1Frc_2czMx--pnwK08_hfKN-AadkP9E
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISCC.2018.8538542
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781538669501
1538669501
EndPage 00718
ExternalDocumentID 8538542
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i90t-bf15db552523ba72623d8a1181b33b8ad61df0d0454a4ddba02b9732ce5a67453
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:54 EDT 2023
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-bf15db552523ba72623d8a1181b33b8ad61df0d0454a4ddba02b9732ce5a67453
PageCount 6
ParticipantIDs ieee_primary_8538542
PublicationCentury 2000
PublicationDate 2018-June
PublicationDateYYYYMMDD 2018-06-01
PublicationDate_xml – month: 06
  year: 2018
  text: 2018-June
PublicationDecade 2010
PublicationTitle 2018 IEEE Symposium on Computers and Communications (ISCC)
PublicationTitleAbbrev ISCC
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002685716
Score 2.1081057
Snippet Shamir's Secret Sharing Scheme is well established and widely used. It allows a so-called Dealer to split and share a secret k among n Participants such that...
SourceID ieee
SourceType Publisher
StartPage 00713
SubjectTerms Analytical models
Computational modeling
Computers
Cryptography
Interpolation
Protocols
Title Secret Sharing Schemes with Hidden Sets
URI https://ieeexplore.ieee.org/document/8538542
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA_TkyeVTfwmB8GL7Zq0ydLzcExhInTCbiNpXkDETlx38a_3vbZOFA_ekkBIXkLyvn-PsStUkUUKFiIRjIqygC_dgUyx6zPrQy5ag9vsQU-fsvuFWvTYzTYXBgCa4DOIqdn48v2q3JCpbIisxagMP9wdk8g2V2trT5HaKJT9O8elSPLhXTEeU-yWibt5PwqoNPxjss9mXyu3YSMv8aZ2cfnxC5Txv1s7YIPvTD3-uOVBh6wHVZ9dFyQL1pzAmHGUF3gxr7DmZHPlU8IMqXgB9XrA5pPb-XgadQURouc8qSMXhPJOKYnKo7MjiZKLN5YyR12aOmO9Fj4knkD1bOa9s4l0BMZTgrJ6lKn0iO1WqwqOGUc1ChUJE3Kdk8hmjfLaJiaUQhudennC-kTj8q2FvFh25J3-PXzG9uic2wiqc7Zbv2_gAnl17S6bS_oEbq6R4g
link.rule.ids 310,311,786,790,795,796,802,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH-MedCTyiZ-m4PgxXb9Spaeh6PTdQidsNtImgRE7MS1F_96X9paUTx4ywchXyS_917e-wXgGlVkP9RCO77h1IkMnnSpgxCzKhLKxH5jcEsXLHmK7ld01YPbLhZGa107n2nXJuu3fLXJK2sqGyG0cBrhhbuDOO_FTbRWZ1EJGKco_bdPl1g_mmWTifXe4m7b8scXKjWCTPch_eq7cRx5catSuvnHL1rG_w7uAIbfsXrksUOhQ-jpYgA3mZUGS2LpmLGUZLg1r3pLrNWVJJY1pCCZLrdDWE7vlpPEab9EcJ5jr3Sk8amSlAaoPkoxDlB2UVzY2FEZhpILxXxlPGVp9USklBReIC0dT66pYOOIhkfQLzaFPgaCihSqEtzELLZCm-BUMeFxk_uMs1AFJzCwc1y_NaQX63Z6p38XX8Fuskzn6_ls8XAGe3bNG3-qc-iX75W-QOQu5WW9YZ9Za5U4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+IEEE+Symposium+on+Computers+and+Communications+%28ISCC%29&rft.atitle=Secret+Sharing+Schemes+with+Hidden+Sets&rft.au=de+Souza%2C+Rick+Lopes&rft.au=Vigil%2C+Martin&rft.au=Custodio%2C+Ricardo&rft.au=Caullery%2C+Florian&rft.date=2018-06-01&rft.pub=IEEE&rft.spage=00713&rft.epage=00718&rft_id=info:doi/10.1109%2FISCC.2018.8538542&rft.externalDocID=8538542