{"title":"(k, n)-阈值乘式秘密共享方案的密码分析","authors":"Ping Long, Bo Mi, Darong Huang, Hongyang Pan","doi":"10.1109/SAFEPROCESS45799.2019.9213385","DOIUrl":null,"url":null,"abstract":"Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.","PeriodicalId":353946,"journal":{"name":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme\",\"authors\":\"Ping Long, Bo Mi, Darong Huang, Hongyang Pan\",\"doi\":\"10.1109/SAFEPROCESS45799.2019.9213385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.\",\"PeriodicalId\":353946,\"journal\":{\"name\":\"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAFEPROCESS45799.2019.9213385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme
Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.