Proactive Secret Sharing and Public Key Cryptosystems
نویسندگان
چکیده
Secret sharing schemes protect secrecy and integrity of information by dividing it into shares and distributing these shares among different locations. In k + 1 out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary compromises no more than k of the n locations. For long-lived and sensitive secrets this protection may be insufficient. We propose a new type of secret sharing scheme, called proactive, in which the share holders periodically (e.g. once a day) rerandomize the distribution of the secret into shares in such a way that if the adversary learns no more than k shares before the rerandomization, this information is useless for attacking the secret afterwards. In other words, the adversary willing to learn or destroy the secret has to break to at least k + 1 locations during the same time period, i.e. between consecutive executions of the rerandomization protocol. We extend proactive secret sharing schemes to function sharing, which allows for various proactive public key cryptosystems. As example, we construct with n = 2k+ 1 servers a proactive Certification Authority, such that the adversary who wants to learn or destroy its secret signature key has to break to more than k servers during a single time period. We propose two efficient proactive secret sharing protocols. We define the security notions of proactive secret sharing and we provide the proofs of security of the two protocols we propose. Our solutions assume broadcast channel between servers and the computational hardness of some cryptographic primitives. Thesis Supervisor: Ronald L. Rivest Title: Professor Thesis Supervisor: Hugo Krawczyk Title: IBM Research Thesis Supervisor: Moti Yung Title: IBM Research
منابع مشابه
Asynchronous Proactive Cryptosystems Without Agreement
In this paper, we present efficient asynchronous protocols that allow to build proactive cryptosystems secure against a mobile fail-stop adversary. Such systems distribute the power of a public-key cryptosystem among a set of servers, so that the security and functionality of the overall system is preserved against an adversary that crashes and/or eavesdrops every server repeatedly and transien...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملA Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t, n)-threshold scheme, which means that the data can be recovered if t servers cooperate (in other words, that the data cannot be revealed unless t servers collude). The proactive scheme provides stronger security agai...
متن کاملUsing Byzantine Quorum Systems to Manage Confidential Data∗
This paper addresses the problem of using proactive cryptosystems for generic data storage and retrieval. Proactive cryptosystems provide high security and confidentiality guarantees for stored data, and are capable of withstanding attacks that may compromise all the servers in the system over time. However, proactive cryptosystems are unsuitable for generic data storage uses for two reasons. F...
متن کاملOptimal Resilience Proactive Public-Key Cryptosystems
We introduce new eecient techniques for sharing cryptographic functions in a distributed dynamic fashion. These techniques dynamically and securely transform a distributed function (or secret sharing) representation between tout of -l (polynomial sharing) and tout of -t (additive sharing). We call the techniques poly-to-sum and sum-to-poly, respectively. Employing these techniques, we solve a n...
متن کامل