Improving the security of asymmetric secret sharing scheme and its new applications

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Keiichi Iwamura , Ahmad Akmal Aminuddin Mohd Kamal
{"title":"Improving the security of asymmetric secret sharing scheme and its new applications","authors":"Keiichi Iwamura ,&nbsp;Ahmad Akmal Aminuddin Mohd Kamal","doi":"10.1016/j.jisa.2025.104098","DOIUrl":null,"url":null,"abstract":"<div><div>In conventional <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> threshold secret sharing, secret information or input can be recovered by collecting <span><math><mi>k</mi></math></span> shares from <span><math><mi>n</mi></math></span> servers, regardless of the honesty of the player. However, in asymmetric secret sharing, the input remains unrecoverable even if the attacker collects all shares from all data servers. Asymmetric secret sharing provides an asymmetric structure in which only an honest/authorized player can regain the input by combining shares from the data servers with pseudorandom numbers that are generated by the authorized player to complete the required <span><math><mi>k</mi></math></span> shares. Nevertheless, the asymmetric secret sharing scheme does not rely on information-theoretic security but rather on computational security. In this study, we first demonstrate the vulnerability of the conventional computationally secure asymmetric secret sharing scheme by presenting possible attacks on the scheme. We then show that by introducing true random numbers, an asymmetric secret sharing scheme with information-theoretic security can be achieved under certain conditions. We also identify and provide a detailed discussion of the conditions required to achieve information-theoretic security. However, the required conditions result in a reduction in storage efficiency on the server. We implemented our proposed method and evaluated its efficiency under these conditions, and showed that the execution time remains within the acceptable range and has a minimal effect on practical use. Moreover, we show that the proposed method can realize new applications that are not possible with conventional secret sharing schemes, such as secure data management that does not leak secret information even if the entire dataset in the cloud containing the shares is compromised, and communication, including IoT communication.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104098"},"PeriodicalIF":3.8000,"publicationDate":"2025-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001358","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In conventional (k,n) threshold secret sharing, secret information or input can be recovered by collecting k shares from n servers, regardless of the honesty of the player. However, in asymmetric secret sharing, the input remains unrecoverable even if the attacker collects all shares from all data servers. Asymmetric secret sharing provides an asymmetric structure in which only an honest/authorized player can regain the input by combining shares from the data servers with pseudorandom numbers that are generated by the authorized player to complete the required k shares. Nevertheless, the asymmetric secret sharing scheme does not rely on information-theoretic security but rather on computational security. In this study, we first demonstrate the vulnerability of the conventional computationally secure asymmetric secret sharing scheme by presenting possible attacks on the scheme. We then show that by introducing true random numbers, an asymmetric secret sharing scheme with information-theoretic security can be achieved under certain conditions. We also identify and provide a detailed discussion of the conditions required to achieve information-theoretic security. However, the required conditions result in a reduction in storage efficiency on the server. We implemented our proposed method and evaluated its efficiency under these conditions, and showed that the execution time remains within the acceptable range and has a minimal effect on practical use. Moreover, we show that the proposed method can realize new applications that are not possible with conventional secret sharing schemes, such as secure data management that does not leak secret information even if the entire dataset in the cloud containing the shares is compromised, and communication, including IoT communication.
改进非对称秘密共享方案的安全性及其新应用
在传统的(k,n)阈值秘密共享中,秘密信息或输入可以通过从n个服务器收集k份来恢复,而不管玩家是否诚实。然而,在非对称秘密共享中,即使攻击者收集了来自所有数据服务器的所有共享,输入仍然是不可恢复的。非对称秘密共享提供了一种非对称结构,在这种结构中,只有诚实/授权的玩家才能通过将来自数据服务器的份额与授权玩家生成的伪随机数相结合来重新获得输入,以完成所需的k个份额。然而,非对称秘密共享方案不依赖于信息论安全,而是依赖于计算安全。在这项研究中,我们首先展示了传统的计算安全的非对称秘密共享方案的脆弱性,提出了可能的攻击方案。通过引入真随机数,可以在一定条件下实现具有信息论安全性的非对称秘密共享方案。我们还确定并详细讨论了实现信息论安全性所需的条件。但是,所要求的条件会降低服务器上的存储效率。我们在这些条件下实现了我们提出的方法,并评估了它的效率,并表明执行时间仍然在可接受的范围内,并且对实际使用的影响很小。此外,我们表明,所提出的方法可以实现传统秘密共享方案无法实现的新应用,例如即使包含共享的云中的整个数据集遭到破坏也不会泄露秘密信息的安全数据管理,以及通信,包括物联网通信。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信