Clever Geek Handbook
📜 ⬆️ ⬇️

Sharing a secret

Each fraction of a secret is a plane, and the secret is the intersection point of three planes. Two fractions of a secret allow you to get the line on which the secret point lies.

Secret sharing is a term in cryptography that refers to any of the methods for distributing a secret among a group of participants, each of which has its own share. The secret can be recreated only by a coalition of participants from the original group, and the number of members of the coalition must be at least some of them initially known.

Secret sharing schemes are used in cases where there is a significant probability of compromising one or more secret keepers, but the probability of unfair conspiracy of a significant part of the participants is considered negligible.

Existing schemes have two components: separation and restoration of secret. Separation includes the formation of parts of a secret and their distribution between members of a group, which allows you to share responsibility for the secret between its members. The reverse scheme should ensure its restoration, subject to the availability of its custodians in some necessary quantity [1] .

Usage example: secret ballot protocol based on the separation of secret [2] .

Content

  • 1 The simplest example of a secret sharing scheme
  • 2 Threshold circuit
    • 2.1 Shamir scheme
    • 2.2 Blackley circuit
    • 2.3 Schemes based on the Chinese remainder theorem
    • 2.4 Schemes based on the solution of systems of equations
    • 2.5 Methods of cheating the threshold scheme
  • 3 See also
  • 4 notes
  • 5 Literature

The simplest example of a secret sharing scheme

Let there be a group oft {\ displaystyle t}   person and messages {\ displaystyle s}   lengthsn {\ displaystyle n}   consisting of binary characters. If you select randomly such binary messagessone,...,st {\ displaystyle s_ {1}, \ ldots, s_ {t}}   that in total they will equals {\ displaystyle s}   , and distribute these messages among all members of the group, it turns out that it will be possible to read the message only if all members of the group come together [1] .

There is a significant problem in such a scheme: if at least one of the members of the group is lost, the secret will be lost for the whole group irretrievably.

Threshold Scheme

In contrast to the procedure for breaking the secret, wheret=n {\ displaystyle t = n}   , in the procedure for sharing a secret, the number of shares that are needed to restore the secret may differ from how many shares the secret is divided. Such a scheme is called a threshold scheme.(t,n) {\ displaystyle \ left (t, n \ right)}   wheren {\ displaystyle n}   - the number of shares into which the secret was divided, andt {\ displaystyle t}   - the number of shares that are needed to restore the secret. Circuit ideast≠n {\ displaystyle t \ neq n}   were independently proposed in 1979 by Adi Shamir and George Blackley . In addition, similar procedures were investigated by Gus Simmons [3] [4] [5] .

If the coalition of participants is such that they have enough shares to restore the secret, then the coalition is called allowed. Secret sharing schemes, in which permitted coalitions of participants can uniquely restore a secret, and unauthorized ones do not receive any posterior information about the possible value of a secret, are called perfect [6] .

Shamir's scheme

 
An unlimited number of polynomials of degree 2 can be drawn through two points. To choose the only one, you need a third point

The idea of ​​the scheme is that two points are enough for defining a straight line , three points for defining a parabola , four points for a cubic parabola , and so on. To set a polynomial degreek {\ displaystyle k}   requiredk+one {\ displaystyle k + 1}   points.

So that after separation, the secret can only be restoredk {\ displaystyle k}   participants, it is "hidden" in the formula of a polynomial of degree(k-one) {\ displaystyle (k-1)}   over the final fieldG {\ displaystyle G}   . To uniquely restore this polynomial, it is necessary to know its values ​​ink {\ displaystyle k}   points, and, using a smaller number of points, it is not possible to uniquely restore the original polynomial. The number of different points of the polynomial is not limited (in practice, it is limited by the size of the number fieldG {\ displaystyle G}   in which the calculations are made).

Briefly, this algorithm can be described as follows. Let a finite field be givenG {\ displaystyle G}   . Fixn {\ displaystyle n}   various nonzero unclassified elements of this field. Each of these elements is assigned to a specific member of the group. Next, an arbitrary set oft {\ displaystyle t}   field elementsG {\ displaystyle G}   of which the polynomial is composedf(x) {\ displaystyle f (x)}   over the fieldG {\ displaystyle G}   degrees oft-one,one<t≤n {\ displaystyle t-1,1 <t \ leq n}   . After receiving the polynomial, we calculate its value at unclassified points and report the results to the appropriate members of the group [1] .

To restore the secret, you can use the interpolation formula, for example, the Lagrange formula.

An important advantage of the Shamir scheme is that it is easily scalable [5] . To increase the number of users in a group, you only need to add the corresponding number of unclassified elements to existing ones, while the conditionri≠rj {\ displaystyle r_ {i} \ neq r_ {j}}   ati≠j {\ displaystyle i \ neq j}   . At the same time, the compromise of one part of the secret translates the scheme from(n,t) {\ displaystyle (n, t)}   threshold in(n-one,t-one) {\ displaystyle (n-1, t-1)}   -threshold.

Blackley circuit

Two non-parallel lines in the plane intersect at one point. Any two non-coplanar planes intersect in one straight line, and three non-coplanar planes in space intersect at the same point. In general, n n -dimensional hyperplanes always intersect at one point. One of the coordinates of this point will be a secret. If you encode a secret as several coordinates of a point, then by one fraction of the secret (one hyperplane) you can get some information about the secret, that is, about the interdependence of the coordinates of the intersection point.

   
Blackley's scheme in three dimensions: each fraction of a secret is a plane , and the secret is one of the coordinates of the intersection point of the planes. Two planes are not enough to determine the intersection point.

Using the Blackley scheme [4], you can create a (t, n) -second secret sharing scheme for any t and n : to do this, use the dimension of space equal to t , and give each of the n players one hyperplane passing through the secret point. Then any t of n hyperplanes will uniquely intersect at a secret point.

The Blackley scheme is less effective than the Shamir scheme: in the Shamir scheme, each share is the same size as the secret, and in the Blackley scheme each share is t times larger. There are improvements to the Blackley scheme to improve its efficiency.

Schemes based on the Chinese remainder theorem

In 1983, , Asmouth, and Bloom proposed two secret sharing schemes based on the Chinese remainder theorem . For a certain number (in the Mignotte scheme this is the secret itself, in the Asmouth-Bloom scheme is some derived number), the remainders of division by a sequence of numbers that are distributed to the sides are calculated. Due to restrictions on the sequence of numbers, only a certain number of parties can restore a secret [7] [8] .

Let the number of users in the group equaln {\ displaystyle n}   . In the Mignott scheme, a certain set of pairwise mutually prime numbers is selected{mone,m2,...,mn} {\ displaystyle \ {m_ {1}, m_ {2}, ..., m_ {n} \}}   such that the productk-one {\ displaystyle k-1}   the largest numbers are less than the productk {\ displaystyle k}   smallest of these numbers. Let these works be equalM {\ displaystyle M}   andN {\ displaystyle N}   , respectively. Numberk {\ displaystyle k}   called the threshold for the constructed circuit over the set{mone,m2,...,mn} {\ displaystyle \ {m_ {1}, m_ {2}, ..., m_ {n} \}}   . The number is selected as a secret.S {\ displaystyle S}   one for which the relation holdsM<S<N {\ displaystyle M <S <N}   . Parts of the secret are distributed among the members of the group as follows: each member is given a pair of numbers(ri,mi) {\ displaystyle (r_ {i}, m_ {i})}   whereri≡S(modmi) {\ displaystyle r_ {i} \ equiv S {\ pmod {m_ {i}}}}   .

To restore the secret, you need to combinet≥k {\ displaystyle t \ geq k}   fragments. In this case, we obtain a system of comparisons of the formx≡ri(modmi) {\ displaystyle x \ equiv r_ {i} {\ pmod {m_ {i}}}}   whose many solutions can be found using the Chinese remainder theorem . Secret numberS {\ displaystyle S}   belongs to this set and satisfies the conditionS<mone⋅m2⋅...⋅mt {\ displaystyle S <m_ {1} \ cdot m_ {2} \ cdot ... \ cdot m_ {t}}   . It is also easy to show that if the number of fragments is lessk {\ displaystyle k}   , then, to find a secretS {\ displaystyle S}   need to sort out the orderNM {\ displaystyle {\ frac {N} {M}}}   integers. With the right choice of numbersmi {\ displaystyle m_ {i}}   this sorting is almost impossible to implement. For example, if bit depthmi {\ displaystyle m_ {i}}   will be from 129 to 130 bits, andk<fifteen {\ displaystyle k <15}   , then the ratioNM {\ displaystyle {\ frac {N} {M}}}   will have order2one hundred {\ displaystyle 2 ^ {100}}   [9] .

The Asmouth-Bloom scheme is a modified Mignott scheme. Unlike the Mignott scheme, it can be built in such a way that it is perfect [10] .

Schemes based on solving systems of equations

In 1983, Karnin, Green, and Hellman proposed a secret sharing scheme based on the inability to solve the system withm {\ displaystyle m}   unknown having lessm {\ displaystyle m}   equations [11] .

Within the framework of this scheme,n+one {\ displaystyle n + 1}  m {\ displaystyle m}   -dimensional vectorsV0,Vone,...,Vn {\ displaystyle V_ {0}, V_ {1}, ..., V_ {n}}   so that any matrix sizedm×m {\ displaystyle m \ times m}   made up of these vectors had the rankm {\ displaystyle m}   . Let the vectorU {\ displaystyle U}   has dimensionm {\ displaystyle m}   .

The secret in the scheme is the matrix productUT⋅V0 {\ displaystyle U ^ {T} \ cdot V_ {0}}   . The fractions of a secret are worksUT⋅Vi,one≤i≤n {\ displaystyle U ^ {T} \ cdot V_ {i}, 1 \ leq i \ leq n}   .

Having anym {\ displaystyle m}   shares, you can make a system of linear equations of dimensionm×m {\ displaystyle m \ times m}   unknown in which are the coefficientsU {\ displaystyle U}   . Having solved this system, you can findU {\ displaystyle U}   and havingU {\ displaystyle U}   You can find a secret. Moreover, the system of equations has no solution if the fractions are less thanm {\ displaystyle m}   [12] .

Ways to cheat a threshold circuit

There are several ways to violate the threshold circuit protocol:

  • the owner of one of the shares may interfere with the restoration of the general secret by giving back the wrong (random) share at the right time [13] ;
  • an attacker, without a share, may be present when restoring a secret. After waiting for the announcement of the required number of shares, he quickly restores the secret on his own and generates another share, after which he presents it to the other participants. As a result, he gains access to the secret and remains uncaught [14] .

There are also other possibilities of disruption that are not related to the features of the implementation of the scheme:

  • an attacker can simulate a situation in which disclosure of a secret is necessary, thereby deriving the shares of participants [14] .

See also

  • Verifiable secret sharing

Notes

  1. ↑ 1 2 3 Alferov, Teeth, Kuzmin et al., 2002 , p. 401.
  2. ↑ Schoenmakers, 1999 .
  3. ↑ CJ Simmons. An introduction to shared secret and / or shared control schemes and their application // Contemporary Cryptology. - IEEE Press, 1991 .-- P. 441-497 .
  4. ↑ 1 2 Blakley, 1979 .
  5. ↑ 1 2 Shamir, 1979 .
  6. ↑ Blackley, Kabatiansky, 1997 .
  7. ↑ Mignotte, 1982 .
  8. ↑ Asmuth, Bloom, 1983 .
  9. ↑ Moldovian, Moldovian, 2005 , p. 225.
  10. ↑ Shenets, 2011 .
  11. ↑ Karnin, Greene, Hellman, 1983 .
  12. ↑ Schneier B. Applied Cryptography. - 2nd ed. - Triumph, 2002 .-- S. 590. - 816 p. - ISBN 5-89392-055-4 .
  13. ↑ Pasailă, Alexa, Iftene, 2010 .
  14. ↑ 1 2 Schneier, 2002 , p. 69.

Literature

  • Schneier B. 3.7. Sharing a secret // Applied cryptography. Protocols, algorithms, C source code = Applied Cryptography. Protocols, Algorithms and Source Code in C. - M .: Triumph, 2002. - S. 93-96. - 816 s. - 3000 copies. - ISBN 5-89392-055-4 .
  • Schneier B. 23.2 Secret sharing algorithms // Applied cryptography. Protocols, algorithms, C source code = Applied Cryptography. Protocols, Algorithms and Source Code in C. - M .: Triumph, 2002. - S. 588-591. - 816 s. - 3000 copies. - ISBN 5-89392-055-4 .
  • Blakley G. R. Safeguarding cryptographic keys // Proceedings of the 1979 AFIPS National Computer Conference - Montvale : AFIPS Press , 1979. - P. 313-317. - doi: 10.1109 / AFIPS.1979.98
    <a href=" https://wikidata.org/wiki/Track:Q21589199 "> </a> <a href=" https://wikidata.org/wiki/Track:Q21589168 "> </a> <a href = " https://wikidata.org/wiki/Track:Q178277 "> </a> <a href=" https://wikidata.org/wiki/Track:Q21589192 "> </a>
  • Shamir A. How to share a secret // Commun. ACM - New York City : ACM , 1979. - Vol. 22, Iss. 11. - P. 612-613. - ISSN 0001-0782 - doi: 10.1145 / 359168.359176
    <a href=" https://wikidata.org/wiki/Track:Q127992 "> </a> <a href=" https://wikidata.org/wiki/Track:Q60 "> </a> <a href = " https://wikidata.org/wiki/Track:Q320624 "> </a> <a href=" https://wikidata.org/wiki/Track:Q1120519 "> </a> <a href = " https://wikidata.org/wiki/Track:Q21588915 "> </a>
  • Mignotte M. How to Share a Secret // Cryptography : Proceedings of the Workshop on Cryptography Burg Feuerstein, Germany, March 29 – April 2, 1982 / T. Beth - Springer Berlin Heidelberg , 1983. - P. 371-375. - ( Lecture Notes in Computer Science ; Vol. 149) - ISBN 978-3-540-11993-7 - ISSN 0302-9743 - doi: 10.1007 / 3-540-39466-4_27
    <a href=" https://wikidata.org/wiki/Track:Q27915506 "> </a> <a href=" https://wikidata.org/wiki/Track:Q21587985 "</a> <a href = " https://wikidata.org/wiki/Track:Q924044 "> </a> <a href=" https://wikidata.org/wiki/Track:Q2422408 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27915505 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915498 "> </a>
  • Asmuth C. , Bloom J. A modular approach to key safeguarding // IEEE Trans. Inf. Theory / F. Kschischang - IEEE , 1983. - Vol. 29, Iss. 2. - P. 208–210. - ISSN 0018-9448 - doi: 10.1109 / TIT.1983.1056651
    <a href=" https://wikidata.org/wiki/Track:Q16194641 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915587 "</a> <a href = " https://wikidata.org/wiki/Track:Q27915585 "> </a> <a href=" https://wikidata.org/wiki/Track:Q127793 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27915584 "> </a>
  • Karnin E. D. , Greene J. W. , Hellman M. E. On Secret Sharing Systems // IEEE Trans. Inf. Theory / F. Kschischang - IEEE , 1983. - Vol. 29, Iss. 1. - P. 35–41. - ISSN 0018-9448 - doi: 10.1109 / TIT.1983.1056621
    <a href=" https://wikidata.org/wiki/Track:Q16194641 "> </a> <a href=" https://wikidata.org/wiki/Track:Q476466 "> </a> <a href = " https://wikidata.org/wiki/Track:Q28015695 "> </a> <a href=" https://wikidata.org/wiki/Track:Q127793 "> </a> <a href = " https://wikidata.org/wiki/Track:Q28015699 "> </a> <a href=" https://wikidata.org/wiki/Track:Q28015689 "> </a>
  • Blackley D. , Kabatyansky G. A. Generalized ideal schemes sharing a secret and matroids // Probl. transmission inform. - 1997. - T. 33, no. 3. - S. 102–110.
    <a href=" https://wikidata.org/wiki/Track:Q21766851 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27867803 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27867807 "> </a> <a href=" https://wikidata.org/wiki/Track:Q5537041 "> </a>
  • Schoenmakers B. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting // Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15–19, 1999 Proceedings / M. Wiener - Springer Berlin Heidelberg , 1999. - P. 148–164. - ISBN 978-3-540-66347-8 - doi: 10.1007 / 3-540-48405-1_10
    <a href=" https://wikidata.org/wiki/Track:Q27915563 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915561 "</a> <a href = " https://wikidata.org/wiki/Track:Q27915547 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915533 "> </a> <a href = " https://wikidata.org/wiki/Track:Q21587985 "> </a>
  • Alferov A. P. , Zubov A. Yu. , Kuzmin A. S. et al. Fundamentals of cryptography : Textbook - 2nd ed., Rev. and add. - M .: Helios ARV , 2002. - ISBN 978-5-85438-137-6
    <a href=" https://wikidata.org/wiki/Track:Q22304400 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27449776 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27449770 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27048435 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27449771 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27449773 "> </a>
  • Moldovyan N. A. , Moldovyan A. A. Introduction to public key cryptosystems - St. Petersburg. : BHV-Petersburg , 2005 .-- 288 p. - ( Study Guide ) - ISBN 978-5-94157-563-3
    <a href=" https://wikidata.org/wiki/Track:Q27866511 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27866506 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27866508 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27866510 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27866512 "> </a>
  • Pasailă D. , Alexa V. , Iftene S. Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes // International Journal of Computing - 2010. - Vol. 9, Iss. 2. - P. 107–117. - ISSN 2312-5381
    <a href=" https://wikidata.org/wiki/Track:Q27915845 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915849 "</a> <a href = " https://wikidata.org/wiki/Track:Q27915847 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915844 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27915842 "> </a>
  • Schenets N. N. On ideal modular secret sharing schemes in polynomial rings of several variables // International Congress on Informatics: Information Systems and Technologies : Materials of the International Scientific Congress 31 Oct. - Minsk : BSU , 2011. - T. 1. Articles of the faculty of applied mathematics and computer science. - S. 169–173. - ISBN 978-985-518-563-6
    <a href=" https://wikidata.org/wiki/Track:Q27915595 "> </a> <a href=" https://wikidata.org/wiki/Track:Q2280 "> </a> <a href = " https://wikidata.org/wiki/Track:Q27915590 "> </a> <a href=" https://wikidata.org/wiki/Track:Q27915597 "> </a>
Source - https://ru.wikipedia.org/w/index.php?title=Secretion_ sharing &oldid = 96917460


More articles:

  • U-191
  • U-846
  • U-856
  • U-879
  • Leverage, Richard
  • Neftechalinsky District
  • Prussian Military Academy
  • Convection
  • Street Ushinskogo (Lipetsk)
  • Kovaleva Street (Lipetsk)

All articles

Clever Geek | 2019