Browse > Article

Share Renewal Scheme in Proactive Secret Sharing for Threshold Cryptosystem  

이윤호 (한국과학기술원 전자전산학과)
김희열 (한국과학기술원 전자전산학과)
정병천 (한국과학기술원 전자전산학과)
이재원 (한국과학기술원 전자전산학과)
윤현수 (한국과학기술원 전자전산학과)
Abstract
The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs $O(n^2)$ modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less than img ${\frac{1}{2}}$ n-1 adversaries exist and they are static adversary.
Keywords
Secret Sharing; Proactive Secret Sharing; Threshold Cryptography; (k,n) threshold scheme;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Jarecki, 'Efficient Threshold Cryptography', Ph.D Thesis in MIT, 2001
2 A. Shamir, 'How to Share a Secret', vol.22, pp. 612-613, Communications of The ACM, 1979   DOI   ScienceOn
3 B. Chor, S. Goldwasser, S. Micalli and B. Awerbuch, 'Verifiable secret sharing and achieving simultaneous broadcast', pp.335-344, Proc. of IEEE Fund, of Comp. Sci., 1985
4 T.Pederson, 'Non-interactive and information-theoretic secure verifiable secret sharing', pp.129-140, CRYPTO'91-LNCS, 1991
5 T.Pederson, 'A threshold cryptosy stem without a trusted third party', pp.522-526, EuroCrypt'91 -LNCS 1991
6 R.Canetti, 'Adaptive Security for Threshold Cry-ptosystems', pp.98-116, CRYPTO'99 - LNCS, 1999
7 R.Gennero, 'Secure Distributed Key Generation for Discrete-Log Based Cryptosystems', pp.295-310, Eurocrypt'99 - LNCS, 1999
8 S.Jarecki and A.Lysyanskaya, 'Adaptively secure threshold cryptography:Introducing concurrency, removing erasures', Eurocrypt'2000 - LNCS, 2000
9 R.Ostrovsky and M.Yung, 'How to withstand mobile virus attacks', pp.51-61, In Proc. 10th ACM Symp. on Principles of Distributed Computation, 1991   DOI
10 P. Feldman, 'A Practical Scheme for Non-interactive Verifiable Secret Sharing', pp.427-437, Proc. 28th IEEE Symp. on Foundations of Computer Science, Los Angeles, 1987
11 H.K.A.Herzberg, S.Jarecki and M.Yung, 'Proactive Secret Sharing Or: How to Cope With Perpetual Leakage', CRYPTO'95 - LNCS, 1995
12 S.Goldwasser, S.Micali and C.Rackoff, 'The knowledge complexity of interactive proof-system', pp.365-377, STOC. 85, 1985