Submitted:
30 May 2024
Posted:
30 May 2024
You are already at the latest version
Abstract
Keywords:
MSC: 94A62; 94A60; 94A17
1. Introduction
- These are single secret sharing schemes.
- For every new secret, a new share has to be generated for every participant after the reconstruction of the previous secret
- Private channels are essential for the communication between dealers and participants and among the participants.
- These schemes are not capable of identifying the cheater.
- Proposed scheme is efficient due to the use of YCH scheme.
- The proposed scheme can quickly identify the cheater, whether the dealer or the other participants.
- Participant’s share can be used for both the reconstruction and verification.
2. Related Work
- It supports the hierarchical access structures as discussed in the first paragraph of the current section. It improves and enhances the applicability of the hierarchical access structure.
- It supports weighted threshold secret sharing as discussed in the second paragraph without any exponential operation and extra burden.
- It supports secret sharing with multi-stage, multi-level properties with verification of shares lacking in schemes discussed in the third and fourth paragraphs.
-
In the last paragraph of this section, novel schemes is discussed. These schemes do not explain security features such as correctness and forward/backward secrecy.Proposed schemes provide essential security features such as fairness and correctness. At the same time, the proposed scheme’s computational cost and storage cost is much less.
3. Preliminaries/Foundations
3.1. Shamir’s () Secret Sharing Scheme
- Learning of t or more pieces makes S to be uniquely determined.
- Learning of any or less pieces leaves S totally unpredictable.
- At least 2 points are necessary to draw a line. (i.e, one point is not sufficient)
- At least 3 points are necessary to draw a parabola (i.e, less than 3 points are not sufficient )
- Similarly, it takes at least ’t’ points to draw a polynomial of degree ’’ (i.e, less than t points are not sufficient).
- Select a prime number Q
- Randomly select a function
- Compute (i, g(i)) corresponding to the shareholder,
- These points (i, g(i)) are distributed securely to n share holder/participants
- Compute Lagrange’s interpolating polynomial using t shares
- In this way, we get the polynomial in the formwhere = S, is the secret.
3.2. Hierarchical Access Structure
3.3. Overview of YCH Scheme
- In this scheme following notations are used :
- - scheme. where t is for threshold and n is for number of participants.
- denotes the k secrets to be shared.
- n secret shadows are randomly chosen by the dealer and distributed to the participants through a secure channel.
- A random value `r’ is chosen.
- A 2-variable 1-way function h(r,) , . is chosen.
-
( Number of secrets are less than the threshold)
- (a)
- A prime number ’Q’ is chosen by the dealer.
- (b)
- The dealer choose a polynomial mod Q. Degree of polynomial is where,
- (c)
- are the secrets to be shared and are random numbers.
- (d)
- (e)
- For every participant the dealer computes mod Q
- (f)
- Publish .
-
(Number of secrets is greater than the threshold)
- (a)
- A prime number Q and a polynomial is chosen by dealer. Degree of polynomial is . where are the secrets.
- (b)
- For i=1 to n. is computed.
- (c)
- For . is computed
- (d)
- calculated values like are publicly published.
- (e)
- are also published in public.
- Each participant uses his/her share to compute (for i=1 to t)
- The polynomial is determined as follows:
- ( Number of secrets are less than the threshold )
- for (Number of secrets is greater than the threshold)
- from the above equations, we get the secrets
3.4. 2- Variable 1- Way Function
- when r and s, are given is easily computable. But for a givens and , it is very difficult to compute r.
- It is hard to compute when there is no knowledge of s.
- For the given s, it is hard to find two different values and that satisfy the situation .
- It is tough to compute s, for the given r and .
- If we have pairs of r and , it is difficult to find for which .
4. Identification of Problem and Motivation
4.1. Contribution
- It permits parallel reconstruction of secrets.
- Number of the secrets to be distributed can be dynamically determined.
- This scheme is of multi-use. Furthermore, fewer public values, less storage, as well as computing time, are needed in our scheme.
- Any participant can identify the cheater whether he/she is the dealer or the participant.
- There is no need of secure channel between the Dealer and the participant.
- This scheme can also detect the invalid shares.
5. Proposed Scheme
5.1. Overview
5.2. Initialization
- Number of participants is n.
- Number of level is m.They are .
- Each level is associated with a , access structure.
- Dealer chooses n shares , , .
5.3. Distribution
- Number of secrets k is less than the threshold
- Number of secrets k is more than the threshold.
-
( number of secret is less than or equal to )
- (a)
- A prime number Q is chosen by the dealer.
- (b)
- The dealer construct polynomial mod Q. The degree of polynomial is (). Let ,where are the secrets,
- (c)
- , are randomly chosen numbers.
- (d)
- For the participant the dealer computes , .
- (e)
- Publish .
-
( Number of secrets is greater than .)
- (a)
- A prime number Q is chosen.
- (b)
- Dealer construct a polynomial of degree . Letwhere are the secrets.
- (c)
- For . is Computed.
- (d)
- For . is Computed
- (e)
- calculated values like are made public
- (f)
- are published in public.
- 1.
- Calculate actual share () and pseudo share() for the participant of level l using following formulas:where g is one-way function in which denotes the share of participant of level l
- 2.
- Calculate actual share ( ) and pseudo share ( ) of the participant of upper level u using formula::where is the identifier for element of level.
- 3.
- and (if needed) is distributed to each participant using a secure channel.
- 4.
- All ,r values are published.
5.4. Reconstruction
- Case 1
- for
- for
- Case 2
5.5. Verification
- Pseudo share is distributed to participants securely by dealer.
- Each participant uses his actual share () in two variable one way function with random variable r. Let that two way variable function is .
- Calculated values made public.
-
Public share is also published.Now at the time of exchange of shares:
- Each participant compute actual share of each participants
- Using that actual share , is calculated for participant.
- If is equal to already public value of then participant share is valid otherwise the actual share of participant is not valid.
- In a similar way, an individual participant will be able to check the legitimacy of his/her share given by the dealer.
5.6. Example
5.6.1. Distribution
5.6.2. Reconstruction
- Particular level (here level-2) has sufficient number of participants
- Particular level has less no of participants then upper level participant takes part in reconstruction of secret.
6. Security and Performance Analysis
6.1. Adversary Model
- Insider Adversary, These are legitimate shareholders who acquired shares from the dealer.
-
Outsider Adversary, The external adversary is an attacker who does not own any of the dealer’s shares but may try to gain unauthorized access.In general, a dealer is considered as trustworthy as in [3], but here we have considered the worst situation that the dealer is committing fraud by providing fake shares to the participants.
6.2. Security analysis
6.2.1. Formal Security Analysis (Random Oracle Model)
- We assume the proposed scheme as the set of tuples, where Int stands for Intilization/setup phase, dist stands for distribution and Rec is for recovery phase.
-
PP(Public parameters)=
- p : prime number p > n such that p is at least bits long
- H : a hash function,
- : Set of participants
- t: threshold
- There is an adversary contains set of participants and threshold value t.
6.2.2. Informal Security Analysis
- Correctness : In verification phase Each participant compute actual share of other participants using that actual share , is calculated for participant. If is equal to already public value of then participant share is valid otherwise the actual share of participant is not valid.
- Forward secrecy: keys like can only be computed or stored by members of the closed communication group; if a member leaves the group, the departing member will be unable to access the content of future conversations.
- perfectness: We use Shamir’s (t, n) secret sharing scheme for share distribution at each level in the proposed scheme. It is well known that fewer than t participants in Shamir’s (t, n) secret sharing scheme cannot reconstruct the secret. Hence, our scheme is also perfect.
- Fairness of secret sharing One desirable quality in secret sharing is Fairness, which indicates that if one member obtains the secret, the other participants are not harmed. Halpern and Teague [16] were the first to offer rational cryptographic protocols in 2004. They pointed out that any method for reassembling secrets with a well-known upper constraint on the running duration is unstable and that parties will not submit anything in the final round since they have no reason to do so because the other participant does. Regrettably, earlier secret-sharing systems necessitated numerous rounds with high overheads. Zhang et al. [48,49] explain the scheme’s. Fairness but leave out the access mechanism. To summarise, existing fairness schemes necessitate a trusted third party or many rounds of communication. The proposed scheme provides Fairness without the dependency on a third party and extra overheads in communication.
- Freshness of keys: In the proposed scheme, all the exchangeable values depend upon the random bi-variate polynomial. It makes pseudo share, and shares are always fresh. Hence, it is impossible to impersonate a member by recording a previously used key.
- Eavesdropping attack In proposed scheme, each participant uses his actual share () in two variable one way function with random variable r which makes it independent of public parameters. Therefore, an adversary will not be able to know any secret information from communication parameters. So, the proposed scheme is safe from eavesdropping activities.
- Cheating identification In the proposed scheme, an individual participant can check the legitimacy of his/her share given by the dealer. Thus, the proposed scheme provides cheating identification.
- Verifiability In the reconstruction phase, participants can verify shares received from other participants and dealers. On the other hand, a dealer can also verify the participant’s shares. Thus, the proposed scheme provides verifiability.
- Unconditional security While exploring the security analysis, both types of adversaries are considered with their capacity to the full extent. It implies that no assumptions are made about an adversary’s computing power and resources.
6.3. Performance analysis
6.3.1. Computational cost
6.3.2. Storage Cost
7. Comparison with Existing Scheme
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Asmuth C. and Bloom J., “A modular approach to key safeguarding,” IEEE transactions on information theory, vol. 29, no. 2, pp. 208–210, 1983.
- Ballico1 E., Boato G., Fontanari C., and Granelli F., “Hierarchical secret sharing in ad hoc networks through birkhoff interpolation,” in Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005, EIAE 2005, pp. 157–164, Springer, 2006.
- Banerjee S., Gupta D. S., and Biswas G., “Hierarchy-based cheating detection and cheater identification in secret sharing schemes,” in 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1–6, IEEE, 2018.
- Basit A., Kumar N. C., Venkaiah V. C., Moiz S. A., Tentu A. N., and Naik W., “Multi-stage multi-secret sharing scheme for hierarchical access structure,” in 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 557–563, IEEE, 2017.
- Bisht K. and Deshmukh M., “A novel approach for multilevel multi-secret image sharing scheme,” The Journal of Supercomputing, vol. 77, no. 10, pp. 12157–12191, 2021.
- Blakley G. R., “Safeguarding cryptographic keys,” in Managing requirements knowledge, international workshop on, pp. 313–313, IEEE Computer Society, 1979.
- Blundo C., De Santis A., Stinson D. R., and Vaccaro U., “Graph decompositions and secret sharing schemes,” Journal of cryptology, vol. 8, no. 1, pp. 39–64, 1995.
- Brickell E. F., “Some ideal secret sharing schemes,” in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 468–475, Springer, 1989.
- Bufalo M., Bufalo D., and Orlando G., “Some properties of the computation of the modular inverse with applications in cryptography,” Computation, vol. 11, no. 4, p. 70, 2023.
- Chanu O. B., Tentu A. N., and Venkaiah V. C., “Multi-stage multi-secret sharing schemes based on chinese remainder theorem,” in Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), pp. 1–6, 2015.
- Chen Q., Tang C., and Lin Z., “Efficient explicit constructions of multipartite secret sharing schemes,” IEEE Transactions on Information Theory, vol. 68, no. 1, pp. 601–631, 2021.
- Chen H.-Y., Wu Z.-Y., Chen T.-L., Huang Y.-M., and Liu C.-H., “Security privacy and policy for cryptographic based electronic medical information system,” Sensors, vol. 21, no. 3, p. 713, 2021.
- Choc B., Goldwasser S., Micali S., and Awerbuch B., “Verifiable secret sharing and achieving simultaneity in the presence of faults.,” in Annual Symposium on Foundations of Computer Science (Proceedings), pp. 383–395, 1985.
- Dolev D. and Yao A., “On the security of public key protocols,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208, 1983.
- Gutte V. S. and Parasar D., “Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing,” International Journal of Intelligent Systems, vol. 37, no. 7, pp. 4190–4213, 2022.
- Halpern J. and Teague V., “Rational secret sharing and multiparty computation,” in Proceedings of the thirtysixth annual ACM symposium on Theory of computing, pp. 623–632, 2004.
- Harn L. and Hsu C.-F., “(t, n) multi-secret sharing scheme based on bivariate polynomial,” Wireless Personal Communications, vol. 95, pp. 1495–1504, 2017.
- Harn L., Hsu C.-F., Xia Z., Zhou J., et al., “How to share secret efficiently over networks,” Security and Communication Networks, vol. 2017, 2017.
- Hazzazi M. M., Attuluri S., Bassfar Z., and Joshi K., “A novel cipher-based data encryption with galois field theory,” Sensors, vol. 23, no. 6, p. 3287, 2023.
- He J. and Dawson E., “Multistage secret sharing based on one-way function,” Electronics Letters, vol. 30, no. 19, pp. 1591–1592, 1994.
- He J. and Dawson E., “Multisecret-sharing scheme based on one-way function,” Electronics Letters, vol. 31, no. 2, pp. 93–95, 1995.
- Herranz J. and Sáez G., “New results on multipartite access structures,” IEE Proceedings-Information Security, vol. 153, no. 4, pp. 153–162, 2006.
- Herranz J., Ruiz A., and Sáez G., “New results and applications for multi-secret sharing schemes,” Designs, codes and cryptography, vol. 73, pp. 841–864, 2014.
- Hernández-Álvarez L., Bullón Pérez J. J., Batista F. K., and Queiruga-Dios A., “Security threats and cryptographic protocols for medical wearables,” Mathematics, vol. 10, no. 6, p. 886, 2022.
- Hung-Yu C., Jinn-Ke J., and Yuh-Min T., “A practical (t, n) multi-secret sharing scheme,” IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 83, no. 12, pp. 2762–2765, 2000.
- Jara-Vera V. and Sánchez-Ávila C., “Some notes on a formal algebraic structure of cryptology,” Mathematics, vol. 9, no. 18, p. 2183, 2021.
- Knuth D. E., The art of computer programming. Pearson Education, 2005.
- Lin C., Harn L., and Yea D., “Ideal hierarchical (t, n) secret sharing schemes,” in Proceedings of the Fifth International Conference on Information Assurance and Security (IAS09), Xian, China, Citeseer, 2009.
- Liu Y., Zhang F., and Zhang J., “Attacks to some verifiable multi-secret sharing schemes and two improved schemes,” Information Sciences, vol. 329, pp. 524–539, 2016.
- Ma C. and Cheng R., “Key management based on hierarchical secret sharing in ad-hoc networks,” in Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31-September 5, 2007, Revised Selected Papers 3, pp. 182–191, Springer, 2008.
- Mashhadi S., “Toward a formal proof for multi-secret sharing in the random oracle model,” Information Security Journal: A Global Perspective, vol. 29, no. 5, pp. 244–249, 2020.
- Masood F., Ahmad J., Shah S. A., Jamal S. S., and Hussain I., “A novel hybrid secure image encryption based on julia set of fractals and 3d lorenz chaotic map,” Entropy, vol. 22, no. 3, p. 274, 2020.
- Padró C. and Sáez G., “Secret sharing schemes with bipartite access structure,” IEEE Transactions on Information Theory, vol. 46, no. 7, pp. 2596–2604, 2000.
- Rauf A., Wang Z., Sajid H., and Ali Tahir M., “Secure route-obfuscation mechanism with information-theoretic security for internet of things,” Sensors, vol. 20, no. 15, p. 4221, 2020.
- Ren P., Li F., Wang, Y., Zhou, H., and Liu P., “Ipsadas: identity-privacy-aware secure and anonymous data aggregation scheme,” International Journal of Intelligent Systems, vol. 37, no. 8, pp. 5290–5324, 2022.
- Richter M., Bertram M., Seidensticker J., and Tschache A., “A mathematical perspective on post-quantum cryptography,” Mathematics, vol. 10, no. 15, p. 2579, 2022.
- SageMath, “Use SageMath Online — cocalc.com.” https://cocalc.com/features/sage. [Accessed 30-04-2024].
- Security and So Many Things — asecuritysite.com. https://asecuritysite.com/. [Accessed 30-04-2024].
- Shamir A., “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- Simmons G. J., “How to (really) share a secret,” in Conference on the Theory and Application of Cryptography, pp. 390–448, Springer, 1988.
- Tentu A. N., Bhavani K., Basit A., and Venkaiah V. C., “Sequential (t, n) multi secret sharing scheme for level-ordered access structure,” International Journal of Information Technology, vol. 13, pp. 2265–2275, 2021.
- Tito-Corrioso O., Borges-Quintana M., Borges-Trenard M. A., Rojas O., and Sosa-Gómez G., “On the fitness functions involved in genetic algorithms and the cryptanalysis of block ciphers,” Entropy, vol. 25, no. 2, p. 261, 2023.
- Tompa M. and Woll H., “How to share a secret with cheaters,” journal of Cryptology, vol. 1, no. 3, pp. 133–138, 1989.
- Wang X., Zhang X., Zu C., Yang, Z., Bian G., Zhang, Y., Ruan, W., Wu B., Wu X., Yuan, L., et al., “An accurate cloud-based indoor localization system with low latency,” International Journal of Intelligent Systems, vol. 37, no. 8, pp. 4794–4809, 2022.
- Wu S., Hsu C., Xia Z., Zhang J., and Wu D., “Symmetric-bivariate-polynomial-based lightweight authenticated group key agreement for industrial internet of things,” Journal of Internet Technology, vol. 21, no. 7, pp. 1969–1979, 2020.
- Yang C.-C., Chang T.-Y., and Hwang M.-S., “A (t, n) multi-secret sharing scheme,” Applied Mathematics and Computation, vol. 151, no. 2, pp. 483–490, 2004.
- Yuan J., Yang J., Wang C., Jia X., Fu F.-W., and Xu G., “A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations,” Information Sciences, vol. 592, pp. 36–49, 2022.
- Zhang E., Li M., Yiu S.-M., Du J., Zhu J.-Z., and Jin G.-G., “Fair hierarchical secret sharing scheme based on smart contract,” Information Sciences, vol. 546, pp. 166–176, 2021.
- Zhang Y., Liu Z., and Huang G., “Sure interpolation and its application to hierarchical threshold secret sharing scheme,” in 2008 International Symposium on Computer Science and Computational Technology, vol. 1, pp. 447–450, IEEE, 2008.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

