{"title":"Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme","authors":"Ping Long, Bo Mi, Darong Huang, Hongyang Pan","doi":"10.1109/SAFEPROCESS45799.2019.9213385","DOIUrl":null,"url":null,"abstract":"Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.","PeriodicalId":353946,"journal":{"name":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.