group G
i
, 1 ≤ i ≤ l. The rest of the subsecrets needed
(a
k−α+l+1
, ..., a
k
) could be obtain from TA, through
the use of a function F similar to the one used by the
participants.
F(x) =
α−l
∑
j=1
l
∏
i=1,i6= j
(x− a
k−α+i
)
(a
k−α+ j
− a
k−α+i
)
a
k−α+l+ j
The function F receives as input a
k−α+i
and gives
as output a
k−α+l+i
, where 1 ≤ i ≤ (α − l).
2.3 Hardware Implementation
We can implement our scheme by card-reader tamper-
resistant devices and smart-cards.
The card-reader, which is a device associated to
TA, should be capable of performing computations,
because it should recover the secret
S
. The de-
vice has a rewritable permanent memory that stores
k, p, q, e, a list of certificates {c(A
1
), ..., c(A
m
)}, and
a list of groups with their corresponding threshold
{(G
1
, P
1
, k
1
), ..., (G
l
, P
l
, k
l
)}.
The card-reader should be capable to do:
• register the participant. The card reader checks
the participant’s certificate against the list of al-
lowed participants and does the following:
– if the certificate is invalid the card reader rejects
the participant;
– if the participant is already registered in the cur-
rent reconstruction of the secret, the card reader
rejects the participant;
– otherwise, it registers the participant.
• for each group G
i
it computes its secret g
i
=
(a
i
1
, ..., a
i
k
i
), where 1 ≤ i ≤ l;
• after obtaining all the subsets g
i
, it (TA) uses con-
catenation on them to form one set, the secret
S
=g
1
||...||g
l
, where || is the operation of concate-
nation.
After obtaining the secret it first checks the cor-
rectness by using proof. If the result is correct it dis-
cards any information related to the secret rebuilding.
The smart card is attributed to the participant and
has stored on it all the relevant information (the shares
d
A
(x) and the certificate c(A)). It is able to communi-
cate with the card-reader by carrying out a process
of identification. He sends the information, when
needed, to the card reader and awaits the result, the
secret
S
.
3 CONCLUSIONS
In this paper, we have proposed a method for the man-
agement of a compartmented secret sharing scheme
that allows the increase of the global threshold with-
out modifying the existent shares of the participants.
We have considered the Trusted Authority the central
point of the scheme as a management unit: it creates
the shares, in a RSA manner, and distributes them, re-
builds the secret
S
, and allows the registration of new
participants without modifying the existing shares.
REFERENCES
Blakley, B., Blakley, G. R., Chan, A. H., and Massey, J. L.
(1993). Threshold schemes with disenrollment. In
Advances in Cryptology - CRYPTO 92, volume 740 of
Lecture Notes in Computer Science, pages 540–548.
Springer-Verlag.
DeLaurentis, J. M. (1984). A further weakness in the com-
mon modulus protocol for the rsa cryptoalgorithm.
Cryptologia, 8(3).
Ghodosi, H., Pieprzyk, J., and Safavi-Naini, R. (1998). Se-
cret sharing in multilevel and compartmented groups.
Lecture Notes in Computer Science, 1438:367–378.
Iftene, S. (2007). Secret Sharing Schemes with Applica-
tions in Security Protocols. PhD thesis, ”Al.I.Cuza”
University of Iasi, Iasi, Romania.
Ito, M., Saito, A., and Nishizeki, T. (1987). Secret sharing
scheme realizing general access structure. In IEEE
Global Telecommunications Conference: Globecom
87, pages 99–102. IEEE Press.
Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A.
(1998). Handbook of Applied Cryptography. CRC
Press, volume 6 of discrete mathematics and its appli-
cations edition.
Shamir, A. (1978). A method for obtaining digital sig-
natures and public-key cryptosystems. Communica-
tions of the Association for Computing Machinery,
21(2):120–126.
Shamir, A. (1979). How to share a secret. Communi-
cations of the Association for Computing Machinery,
22(11):612–613.
Simmons, G. J. (1983). A ’weak’ privacy protocol using the
rsa cryptoalgorithm. Cryptologia, 7(2).
Simmons, G. J. (1990). How to (really) share a secret. In
Advances in Cryptology - CRYPTO 88, volume 403 of
Lecture Notes in Computer Science, pages 390–448.
Springer-Verlag.
INTERACTIVE SECRET SHARE MANAGEMENT
269