Sharing many secrets with computational provable security

We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic secur...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information processing letters 2013-07, Vol.113 (14-16), p.572-579
Hauptverfasser: Herranz, Javier, Ruiz, Alexandre, Sáez, Germán
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 579
container_issue 14-16
container_start_page 572
container_title Information processing letters
container_volume 113
creator Herranz, Javier
Ruiz, Alexandre
Sáez, Germán
description We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature. We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme. •Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.
doi_str_mv 10.1016/j.ipl.2013.05.003
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1356576339</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020019013001373</els_id><sourcerecordid>2983357371</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</originalsourceid><addsrcrecordid>eNp9kL1OwzAURi0EEqXwAGyRmBOuYzuJxYQq_qRKDHS3bPeGOkqTYDugvj2uysx0l_NdHR1CbikUFGh13xVu6osSKCtAFADsjCxoU5d5Rak8JwuAEnKgEi7JVQgdAFSc1QsiP3bau-Ez2-vhkAW0HmPIflzcZXbcT3PU0Y2D7rPJj9_a9HhkZu_i4ZpctLoPePN3l2Tz_LRZvebr95e31eM6t6wUMWemMYZvgVcAhksQNZTGggbbGtk2tamkpii5NbVAsFo3stHQGI7IURi2JHent0nga8YQVTfOPhkFRZmoRF0xJhNFT5T1YwgeWzV5t9f-oCioYyDVqRRIHQMpECoFSpuH0waT_bdDr4J1OFjcOo82qu3o_ln_Atf6blM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1356576339</pqid></control><display><type>article</type><title>Sharing many secrets with computational provable security</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</creator><creatorcontrib>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</creatorcontrib><description>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature. We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme. •Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</description><identifier>ISSN: 0020-0190</identifier><identifier>EISSN: 1872-6119</identifier><identifier>DOI: 10.1016/j.ipl.2013.05.003</identifier><identifier>CODEN: IFPLAT</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Cryptography ; Data encryption ; Data integrity ; Information sharing ; Multi-secret sharing schemes ; Provable security ; Semantics ; Studies ; Symmetric encryption</subject><ispartof>Information processing letters, 2013-07, Vol.113 (14-16), p.572-579</ispartof><rights>2013 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Jul/Aug 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</citedby><cites>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.ipl.2013.05.003$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3548,27923,27924,45994</link.rule.ids></links><search><creatorcontrib>Herranz, Javier</creatorcontrib><creatorcontrib>Ruiz, Alexandre</creatorcontrib><creatorcontrib>Sáez, Germán</creatorcontrib><title>Sharing many secrets with computational provable security</title><title>Information processing letters</title><description>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature. We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme. •Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</description><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Information sharing</subject><subject>Multi-secret sharing schemes</subject><subject>Provable security</subject><subject>Semantics</subject><subject>Studies</subject><subject>Symmetric encryption</subject><issn>0020-0190</issn><issn>1872-6119</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNp9kL1OwzAURi0EEqXwAGyRmBOuYzuJxYQq_qRKDHS3bPeGOkqTYDugvj2uysx0l_NdHR1CbikUFGh13xVu6osSKCtAFADsjCxoU5d5Rak8JwuAEnKgEi7JVQgdAFSc1QsiP3bau-Ez2-vhkAW0HmPIflzcZXbcT3PU0Y2D7rPJj9_a9HhkZu_i4ZpctLoPePN3l2Tz_LRZvebr95e31eM6t6wUMWemMYZvgVcAhksQNZTGggbbGtk2tamkpii5NbVAsFo3stHQGI7IURi2JHent0nga8YQVTfOPhkFRZmoRF0xJhNFT5T1YwgeWzV5t9f-oCioYyDVqRRIHQMpECoFSpuH0waT_bdDr4J1OFjcOo82qu3o_ln_Atf6blM</recordid><startdate>20130701</startdate><enddate>20130701</enddate><creator>Herranz, Javier</creator><creator>Ruiz, Alexandre</creator><creator>Sáez, Germán</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20130701</creationdate><title>Sharing many secrets with computational provable security</title><author>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Information sharing</topic><topic>Multi-secret sharing schemes</topic><topic>Provable security</topic><topic>Semantics</topic><topic>Studies</topic><topic>Symmetric encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Herranz, Javier</creatorcontrib><creatorcontrib>Ruiz, Alexandre</creatorcontrib><creatorcontrib>Sáez, Germán</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information processing letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Herranz, Javier</au><au>Ruiz, Alexandre</au><au>Sáez, Germán</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sharing many secrets with computational provable security</atitle><jtitle>Information processing letters</jtitle><date>2013-07-01</date><risdate>2013</risdate><volume>113</volume><issue>14-16</issue><spage>572</spage><epage>579</epage><pages>572-579</pages><issn>0020-0190</issn><eissn>1872-6119</eissn><coden>IFPLAT</coden><abstract>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature. We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme. •Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.ipl.2013.05.003</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0020-0190
ispartof Information processing letters, 2013-07, Vol.113 (14-16), p.572-579
issn 0020-0190
1872-6119
language eng
recordid cdi_proquest_journals_1356576339
source Elsevier ScienceDirect Journals Complete
subjects Cryptography
Data encryption
Data integrity
Information sharing
Multi-secret sharing schemes
Provable security
Semantics
Studies
Symmetric encryption
title Sharing many secrets with computational provable security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T14%3A29%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sharing%20many%20secrets%20with%20computational%20provable%20security&rft.jtitle=Information%20processing%20letters&rft.au=Herranz,%20Javier&rft.date=2013-07-01&rft.volume=113&rft.issue=14-16&rft.spage=572&rft.epage=579&rft.pages=572-579&rft.issn=0020-0190&rft.eissn=1872-6119&rft.coden=IFPLAT&rft_id=info:doi/10.1016/j.ipl.2013.05.003&rft_dat=%3Cproquest_cross%3E2983357371%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1356576339&rft_id=info:pmid/&rft_els_id=S0020019013001373&rfr_iscdi=true