How not to share a set of secrets
نویسندگان
چکیده
This note analyses one of the existing space efficient secret sharing schemes and suggests vulnerabilities in its design. We observe that the said algorithm fails for certain choices of the set of secrets and there is no reason for preferring this particular scheme over alternative schemes. The paper also elaborates the adoption of a scheme proposed by Hugo Krawczyk as an extension of Shamir's scheme, for a set of secrets. Such an implementation is space optimal and works for all choices of secrets. We also propose two new methods of attack which are valid under certain assumptions and observe that it is the elimination of random values that facilitates these kinds of attacks.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملGruppen secret sharing, or, how to share several secrets if you must?
Each member of an n-person team has a secret, say a password. The k out of n gruppen secret sharing requires that any group of k members should be able to recover the secrets of the other n−k members, while any group of k−1 or less members should have no information on the secret of other team member even if other secrets leak out. We prove that when all secrets are chosen independently and hav...
متن کاملHow to Share Knowledge by Gossiping
Given n agents each of which has a secret (a fact not known to anybody else), the classical version of the gossip problem is to achieve shared knowledge of all secrets in a minimal number of phone calls. There exist protocols achieving shared knowledge in 2(n−2) calls: when the protocol terminates everybody knows all the secrets. We generalize that problem and focus on higher-order shared knowl...
متن کاملPrioritising, Ranking and Resource Implementation - A Normative Analysis
Background Priority setting in publicly financed healthcare systems should be guided by ethical norms and other considerations viewed as socially valuable, and we find several different approaches for how such norms and considerations guide priorities in healthcare decision-making. Common to many of these approaches is that interventions are ranked in relation to each other, following the appli...
متن کاملتحلیل منطق اغماء
EXTRACT Although there are new ways to portray the brain, colored and computerized encephalography but Coma is still unknown and such as death remain beyond comprehension and knowing. Is not it ? Perhaps because of this, despite knowing that some part of the brain is not yet fully understood all its parts. But knowing the components that working to each other is key for discovering a lot of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1001.1877 شماره
صفحات -
تاریخ انتشار 2010