Sharing many secrets with computational provable security
We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic secur...
Gespeichert in:
Veröffentlicht in: | Information processing letters 2013-07, Vol.113 (14-16), p.572-579 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 579 |
---|---|
container_issue | 14-16 |
container_start_page | 572 |
container_title | Information processing letters |
container_volume | 113 |
creator | Herranz, Javier Ruiz, Alexandre Sáez, Germán |
description | We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature.
We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme.
•Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures. |
doi_str_mv | 10.1016/j.ipl.2013.05.003 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1356576339</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0020019013001373</els_id><sourcerecordid>2983357371</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</originalsourceid><addsrcrecordid>eNp9kL1OwzAURi0EEqXwAGyRmBOuYzuJxYQq_qRKDHS3bPeGOkqTYDugvj2uysx0l_NdHR1CbikUFGh13xVu6osSKCtAFADsjCxoU5d5Rak8JwuAEnKgEi7JVQgdAFSc1QsiP3bau-Ez2-vhkAW0HmPIflzcZXbcT3PU0Y2D7rPJj9_a9HhkZu_i4ZpctLoPePN3l2Tz_LRZvebr95e31eM6t6wUMWemMYZvgVcAhksQNZTGggbbGtk2tamkpii5NbVAsFo3stHQGI7IURi2JHent0nga8YQVTfOPhkFRZmoRF0xJhNFT5T1YwgeWzV5t9f-oCioYyDVqRRIHQMpECoFSpuH0waT_bdDr4J1OFjcOo82qu3o_ln_Atf6blM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1356576339</pqid></control><display><type>article</type><title>Sharing many secrets with computational provable security</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</creator><creatorcontrib>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</creatorcontrib><description>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature.
We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme.
•Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</description><identifier>ISSN: 0020-0190</identifier><identifier>EISSN: 1872-6119</identifier><identifier>DOI: 10.1016/j.ipl.2013.05.003</identifier><identifier>CODEN: IFPLAT</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Cryptography ; Data encryption ; Data integrity ; Information sharing ; Multi-secret sharing schemes ; Provable security ; Semantics ; Studies ; Symmetric encryption</subject><ispartof>Information processing letters, 2013-07, Vol.113 (14-16), p.572-579</ispartof><rights>2013 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Jul/Aug 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</citedby><cites>FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.ipl.2013.05.003$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3548,27923,27924,45994</link.rule.ids></links><search><creatorcontrib>Herranz, Javier</creatorcontrib><creatorcontrib>Ruiz, Alexandre</creatorcontrib><creatorcontrib>Sáez, Germán</creatorcontrib><title>Sharing many secrets with computational provable security</title><title>Information processing letters</title><description>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature.
We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme.
•Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</description><subject>Cryptography</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Information sharing</subject><subject>Multi-secret sharing schemes</subject><subject>Provable security</subject><subject>Semantics</subject><subject>Studies</subject><subject>Symmetric encryption</subject><issn>0020-0190</issn><issn>1872-6119</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNp9kL1OwzAURi0EEqXwAGyRmBOuYzuJxYQq_qRKDHS3bPeGOkqTYDugvj2uysx0l_NdHR1CbikUFGh13xVu6osSKCtAFADsjCxoU5d5Rak8JwuAEnKgEi7JVQgdAFSc1QsiP3bau-Ez2-vhkAW0HmPIflzcZXbcT3PU0Y2D7rPJj9_a9HhkZu_i4ZpctLoPePN3l2Tz_LRZvebr95e31eM6t6wUMWemMYZvgVcAhksQNZTGggbbGtk2tamkpii5NbVAsFo3stHQGI7IURi2JHent0nga8YQVTfOPhkFRZmoRF0xJhNFT5T1YwgeWzV5t9f-oCioYyDVqRRIHQMpECoFSpuH0waT_bdDr4J1OFjcOo82qu3o_ln_Atf6blM</recordid><startdate>20130701</startdate><enddate>20130701</enddate><creator>Herranz, Javier</creator><creator>Ruiz, Alexandre</creator><creator>Sáez, Germán</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20130701</creationdate><title>Sharing many secrets with computational provable security</title><author>Herranz, Javier ; Ruiz, Alexandre ; Sáez, Germán</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-3b8bb4d04600b4905702bc0a0cfb9f87b69a1e94cb75e0caa898a08b4ee4e5b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Cryptography</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Information sharing</topic><topic>Multi-secret sharing schemes</topic><topic>Provable security</topic><topic>Semantics</topic><topic>Studies</topic><topic>Symmetric encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Herranz, Javier</creatorcontrib><creatorcontrib>Ruiz, Alexandre</creatorcontrib><creatorcontrib>Sáez, Germán</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information processing letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Herranz, Javier</au><au>Ruiz, Alexandre</au><au>Sáez, Germán</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sharing many secrets with computational provable security</atitle><jtitle>Information processing letters</jtitle><date>2013-07-01</date><risdate>2013</risdate><volume>113</volume><issue>14-16</issue><spage>572</spage><epage>579</epage><pages>572-579</pages><issn>0020-0190</issn><eissn>1872-6119</eissn><coden>IFPLAT</coden><abstract>We propose in this work two new multi-secret sharing schemes, that allow to distribute ℓ different secrets among a set P={P1,…,Pn} of players, each one according to a (possibly different) access structure. The two schemes are proved to enjoy computational security, by reduction to the semantic security of the underlying symmetric encryption scheme. The two security proofs are in the standard model and provide the exact relation between the security of the involved primitives. As far as we know, this is the first formal security analysis for a computational multi-secret sharing scheme in the literature.
We compare the two new schemes, taking into account their efficiency properties, their security analysis and possible extensions. One of the schemes has very short secret shares (independently of the number ℓ of secrets) and can be easily extended to work without any trusted dealer. The other scheme has longer secret shares and the extension to work without a trusted dealer is much more complicated, but on the other hand it produces shorter public outputs and the security relation with the underlying symmetric encryption scheme is better, which may have consequences in the final efficiency of the scheme.
•Two new multi-secret sharing schemes, with computational provable security.•The security proofs are in the standard model.•The two schemes generalize schemes previously proposed in the literature.•We compare the two schemes in terms of security, efficiency and extendability.•The schemes work for general access structures.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.ipl.2013.05.003</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0020-0190 |
ispartof | Information processing letters, 2013-07, Vol.113 (14-16), p.572-579 |
issn | 0020-0190 1872-6119 |
language | eng |
recordid | cdi_proquest_journals_1356576339 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Cryptography Data encryption Data integrity Information sharing Multi-secret sharing schemes Provable security Semantics Studies Symmetric encryption |
title | Sharing many secrets with computational provable security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T14%3A29%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sharing%20many%20secrets%20with%20computational%20provable%20security&rft.jtitle=Information%20processing%20letters&rft.au=Herranz,%20Javier&rft.date=2013-07-01&rft.volume=113&rft.issue=14-16&rft.spage=572&rft.epage=579&rft.pages=572-579&rft.issn=0020-0190&rft.eissn=1872-6119&rft.coden=IFPLAT&rft_id=info:doi/10.1016/j.ipl.2013.05.003&rft_dat=%3Cproquest_cross%3E2983357371%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1356576339&rft_id=info:pmid/&rft_els_id=S0020019013001373&rfr_iscdi=true |