antees. Since a secret is used to authorize security-
related operations, we use secret sharing as a medium
to grant actions when dealing with critical operations
on a server.
7 CONCLUSION
Secret sharing can be used to solve challenging key-
management issues (DSouza et al., 2011). However,
due to a lack of public implementations and unclear
functionality, efficiency and security trade-offs, it has
not found its way into industrial use cases.
Based on the example of Brainloop
∗
we showed a
concrete and generic architecture, using secret shar-
ing, which securely perform critical operations as
well as secret key redundancy.
We highlighted the different criteria that need to
be taken into account for the secret sharing algo-
rithm selection. To help selection we also carried
out benchmarks over an open source .NET imple-
mentation (Ahmadvand, 2015) of three of the most
prominent secret sharing schemes from the literature:
Shamir, Benaloh-Leichter and Schoenmakers.
As part of future work, we would consider com-
bining both custom access structure (non-threshold)
and share integrity verification. For this purpose,
Schoenmakers scheme can be modified to handle gen-
eralized access structures. Besides, it would be inter-
esting to measure Schoenmakers’ performance when
elliptic curves are used.
REFERENCES
Ahmadvand, M. (2015). Secret sharing library. Available at
https://github.com/mr-ma/secret-sharing.
Beimel, A. (2011). Secret-sharing schemes: a survey. In
Coding and cryptology, pages 11–46. Springer.
Benaloh, J. and Leichter, J. (1990). Generalized secret shar-
ing and monotone functions. In Proceedings on Ad-
vances in cryptology, pages 27–35. Springer-Verlag
New York, Inc.
Blakley, G. R. et al. (1979). Safeguarding cryptographic
keys. In Proceedings of the national computer confer-
ence, volume 48, pages 313–317.
Bogdanov, D., J
˜
oemets, M., Siim, S., and Vaht, M. (2015).
How the estonian tax and customs board evaluated a
tax fraud detection system based on secure multi-party
computation. In Financial Cryptography and Data Se-
curity, pages 227–234. Springer.
∗
As a consequence of our study, the improved agreement
protocol has been integrated into the Brainloop system.
Bogdanov, D., Laur, S., and Willemson, J. (2008). Share-
mind: A framework for fast privacy-preserving com-
putations. In Computer Security-ESORICS 2008,
pages 192–206. Springer.
BSI (2015). Algorithms for qualified electronic signatures.
Available at http://www.bundesnetzagentur.de/.
Chou, T.-S. (2013). Security threats on cloud computing
vulnerabilities. International Journal of Computer
Science & Information Technology, 5(3):79–88.
DSouza, R., Jao, D., Mironov, I., and Pandey, O.
(2011). Publicly verifiable secret sharing for cloud-
based key management. In Progress in Cryptology–
INDOCRYPT 2011, pages 290–309. Springer.
Feldman, P. (1987). A practical scheme for non-interactive
verifiable secret sharing. In Foundations of Computer
Science, 1987., 28th Annual Symposium on, pages
427–438. IEEE.
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and
Boneh, D. (2003). Terra: A virtual machine-based
platform for trusted computing. In ACM SIGOPS Op-
erating Systems Review, pages 193–206. ACM.
Hadavi, M. A., Jalili, R., and Karimi, L. (2015). Ac-
cess control aware data retrieval for secret sharing
based database outsourcing. Distributed and Parallel
Databases, pages 1–30.
Haldar, V., Chandra, D., and Franz, M. (2004). Semantic re-
mote attestation: a virtual machine directed approach
to trusted computing. In USENIX Virtual Machine Re-
search and Technology Symposium, volume 2004.
Neisse, R., Holling, D., and Pretschner, A. (2011). Imple-
menting trust in cloud infrastructures. In Proceedings
of the 2011 11th IEEE/ACM International Symposium
on Cluster, Cloud and Grid Computing, pages 524–
533. IEEE Computer Society.
Rocha, F. and Correia, M. (2011). Lucy in the sky without
diamonds: Stealing confidential data in the cloud. In
Dependable Systems and Networks Workshops (DSN-
W), 2011 IEEE/IFIP 41st International Conference
on, pages 129–134. IEEE.
Rocha, F., Gross, T., and Van Moorsel, A. (2013). Defense-
in-depth against malicious insiders in the cloud. In
Cloud Engineering (IC2E), 2013 IEEE International
Conference on, pages 88–97. IEEE.
Santos, N., Gummadi, K. P., and Rodrigues, R. (2009). To-
wards trusted cloud computing. In Proceedings of the
2009 conference on Hot topics in cloud computing,
pages 3–3. San Diego, California.
Schoenmakers, B. (1999). A simple publicly verifiable se-
cret sharing scheme and its application to electronic
voting. In Advances in CryptologyCRYPTO99, pages
148–164. Springer.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Shoup, V. (2016). Number theory library.
http://www.shoup.net/ntl/.
Enhancing Operation Security using Secret Sharing
451