Proactive Secret Sharing and Public Key Cryptosystems

نویسندگان

  • Stanislaw Jarecki
  • Hugo Krawczyk
  • Moti Yung
چکیده

Secret sharing schemes protect secrecy and integrity of information by dividing it into shares and distributing these shares among different locations. In k + 1 out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary compromises no more than k of the n locations. For long-lived and sensitive secrets this protection may be insufficient. We propose a new type of secret sharing scheme, called proactive, in which the share holders periodically (e.g. once a day) rerandomize the distribution of the secret into shares in such a way that if the adversary learns no more than k shares before the rerandomization, this information is useless for attacking the secret afterwards. In other words, the adversary willing to learn or destroy the secret has to break to at least k + 1 locations during the same time period, i.e. between consecutive executions of the rerandomization protocol. We extend proactive secret sharing schemes to function sharing, which allows for various proactive public key cryptosystems. As example, we construct with n = 2k+ 1 servers a proactive Certification Authority, such that the adversary who wants to learn or destroy its secret signature key has to break to more than k servers during a single time period. We propose two efficient proactive secret sharing protocols. We define the security notions of proactive secret sharing and we provide the proofs of security of the two protocols we propose. Our solutions assume broadcast channel between servers and the computational hardness of some cryptographic primitives. Thesis Supervisor: Ronald L. Rivest Title: Professor Thesis Supervisor: Hugo Krawczyk Title: IBM Research Thesis Supervisor: Moti Yung Title: IBM Research

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Asynchronous Proactive Cryptosystems Without Agreement

In this paper, we present efficient asynchronous protocols that allow to build proactive cryptosystems secure against a mobile fail-stop adversary. Such systems distribute the power of a public-key cryptosystem among a set of servers, so that the security and functionality of the overall system is preserved against an adversary that crashes and/or eavesdrops every server repeatedly and transien...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

A Secure Key Registration System based on Proactive Secret-Sharing Scheme

We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t, n)-threshold scheme, which means that the data can be recovered if t servers cooperate (in other words, that the data cannot be revealed unless t servers collude). The proactive scheme provides stronger security agai...

متن کامل

Using Byzantine Quorum Systems to Manage Confidential Data∗

This paper addresses the problem of using proactive cryptosystems for generic data storage and retrieval. Proactive cryptosystems provide high security and confidentiality guarantees for stored data, and are capable of withstanding attacks that may compromise all the servers in the system over time. However, proactive cryptosystems are unsuitable for generic data storage uses for two reasons. F...

متن کامل

Optimal Resilience Proactive Public-Key Cryptosystems

We introduce new eecient techniques for sharing cryptographic functions in a distributed dynamic fashion. These techniques dynamically and securely transform a distributed function (or secret sharing) representation between tout of -l (polynomial sharing) and tout of -t (additive sharing). We call the techniques poly-to-sum and sum-to-poly, respectively. Employing these techniques, we solve a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008