Secret Sharing for Generic Theoretic Cryptography

James Smith
DOI: https://doi.org/10.48550/arXiv.2211.01658
2022-11-03
Abstract:Sharing a secret efficiently amongst a group of participants is not easy since there is always an adversary / eavesdropper trying to retrieve the secret. In secret sharing schemes, every participant is given a unique share. When the desired group of participants come together and provide their shares, the secret is obtained. For other combinations of shares, a garbage value is returned. A threshold secret sharing scheme was proposed by Shamir and Blakley independently. In this (n,t) threshold secret sharing scheme, the secret can be obtained when at least t out of n participants contribute their shares. This paper proposes a novel algorithm to reveal the secret only to the subsets of participants belonging to the access structure. This scheme implements totally generalized ideal secret sharing. Unlike threshold secret sharing schemes, this scheme reveals the secret only to the authorized sets of participants, not any arbitrary set of users with cardinality more than or equal to t. Since any access structure can be realized with this scheme, this scheme can be exploited to implement various access priorities and access control mechanisms. A major advantage of this scheme over the existing ones is that the shares being distributed to the participants is totally independent of the secret being shared. Hence, no restrictions are imposed on the scheme and it finds a wider use in real world applications.
Cryptography and Security,Information Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to implement a general secret - sharing scheme capable of handling arbitrary access structures. Specifically, the existing threshold secret - sharing schemes (such as the schemes proposed by Shamir and Blakeley) can only recover the secret under specific conditions (that is, when at least \(t\) participants provide their shares), and cannot flexibly adapt to more complex access - control requirements. ### Main problems of the paper: 1. **Limitations of existing schemes**: Traditional threshold secret - sharing schemes are only applicable to simple threshold conditions and cannot meet more complex application scenarios such as cloud storage, the Internet of Things, and big data. 2. **Flexibility of access structures**: Many practical applications require more complex access - control mechanisms. For example, only certain specific combinations of participants can be specified to recover the secret, rather than any participants reaching a certain number being able to recover the secret. 3. **Efficiency and scalability**: Existing generalized secret - sharing schemes often become infeasible in practical applications because too many shares need to be distributed, resulting in an overly complex key management system. ### Solutions in the paper: The paper proposes a new algorithm to implement a fully generalized ideal secret - sharing scheme. This scheme can achieve arbitrary access structures and has the following characteristics: - **Share distribution independent of secret content**: Each participant's share is independent of the secret to be shared, which makes the scheme more flexible and unrestricted. - **High efficiency**: By using the polynomial construction method, the computational efficiency of the scheme is ensured. - **Security**: Through strict security proofs, it is ensured that only authorized combinations of participants can recover the secret, and other combinations will obtain useless garbage values. ### Markdown representation of formulas: The formulas involved in the paper are as follows: - Polynomial construction: \[ y(x)=(x - c_1)(x - c_2)\cdots(x - c_k)+S \] where \(c_i = \prod_{j\in i}p_j\), and \(p_j\) is the unique prime number assigned to the participant. - Secret recovery: If the set of participants \(\alpha\in\gamma\), then: \[ r = \prod_{i = 1}^{n}p_{\alpha_i} \] and: \[ y(r)=S \] - Security proof: \[ g(x)=(x - c_1)(x - c_2)\cdots(x - c_k) \] Therefore: \[ y(x)=g(x)+S \] When \(r = c_i\), \(g(r)=0\), so \(y(r)=S\); otherwise, \(y(r)\neq S\). Through these improvements, the paper aims to provide a more general and flexible secret - sharing scheme to adapt to various complex application scenarios.