Análise de Vulnerabilidade de Esquemas de Segredo Compartilhado Considerando um novo Modelo de Ameaça

  • Rick Lopes de Souza UFSC
  • Martin Vigil UFSC
  • Ricardo Felipe Custódio UFSC

Abstract


Secret sharing schemes are cryptographic primitives used to distribute parts of a secret among a set of participants in such a way that only an authorized subset can rebuild the secret. Traditionally, most secret sharing schemes work with only two entity definitions: The Dealer and Participants. For these schemes, several threat models have been proposed considering only these two entities. However, in the literature it is not clear who should play the role of rebuilding the secret and who would be the keeper of the secret. These two new entities modify the existing threat models that consider: (i) the distributor initializes the system and splits and shares the secret, and (ii) the participants cooperate or not with the secret reconstruction. In this work we propose a new threat model considering the new entities that represent the roles involved in shared secret schemes. Considering this new model, we show that some of the best-known schemes are vulnerable. We make evaluations checking which points can be safely maintained and at which points vulnerabilities will emerge according to the new entities and new threat model.

References

Beimel, A. (2011). Secret-sharing schemes: a survey. In Coding and cryptology, pages 11–46. Springer.

Blakley, G. R. (1979). Safeguarding cryptographic keys. In Proc. AFIPS 1979 National Computer Conference, pages 313–317.

Carpentieri, M. (1995). A perfect threshold secret sharing scheme to identify cheaters. Designs, Codes and Cryptography, 5(3):183–187.

Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing. In Foundations of Computer Science, 1987., 28th Annual Symposium on, pages 427–438. IEEE.

Martin, K. M. (2008). Challenging the adversary model in secret sharing schemes. Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pages 45–63.

Pedersen, T. P. et al. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. In Crypto, volume 91, pages 129–140. Springer.

Rabin, T. and Ben-Or, M. (1989). Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, pages 73–85. ACM.

Rogaway, P. and Bellare, M. (2007). Robust computational secret sharing and a unified account of classical secret-sharing goals. In Proceedings of the 14th ACM conference on Computer and communications security, pages 172–184. ACM.

Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612–613.

Tompa, M. and Woll, H. (1989). How to share a secret with cheaters. journal of Cryptology, 1(3):133–138.
Published
2017-11-06
SOUZA, Rick Lopes de; VIGIL, Martin; CUSTÓDIO, Ricardo Felipe. Análise de Vulnerabilidade de Esquemas de Segredo Compartilhado Considerando um novo Modelo de Ameaça. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 17. , 2017, Brasília. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2017 . p. 348-361. DOI: https://doi.org/10.5753/sbseg.2017.19511.

Most read articles by the same author(s)

1 2 > >>