Secrecy Computation without Changing Polynomial Degree in
Shamir’s (K, N) Secret Sharing Scheme
Takeshi Shingu
1
, Keiichi Iwamura
1
and Kitahiro Kaneda
2
1
Tokyo University of Science, Tokyo, Japan
2
Institute of Document Analysis and Knowledge Science, Osaka Prefecture University, 1-1 Naka-ku, Sakai, Osaka, Japan
Keywords: Secrecy Computation, Secrecy Multiplication, Secrecy Division, Secrecy Addition, Secrecy Subtraction,
(K, N) Secret Sharing Scheme.
Abstract: In This Paper, We Propose a New Secrecy Multiplication Scheme without Changing the Degree in Shamir’s
(K, N) Secret Sharing Scheme. This Scheme Generates a Scalar Value Called Concealed Secret, Which
Multiplies a Secret by a Random Number, and Distributes the Concealed Secret by using a Secret Sharing
Scheme. When Secrecy Multiplying, We Temporarily Reconstruct the Concealed Secret, and Multiply It with
a Share. Therefore, We Can Perform Secrecy Multiplication without Changing the Degree of Polynomials by
Multiplying a Polynomial and Scalar Value. Our Scheme Can Extend to Secrecy Division by Dividing a Share
with the Concealed Secret. in Addition, We Propose Secrecy Addition and Subtraction Schemes. We Evaluate
the Security of Our Schemes, and Show a Possible Application That Cannot Realized using the Conventional
Scheme.
1 INTRODUCTION
Cloud computing (Mell, 2011) has brought about
considerable changes in users’ data utilization. Users
can save their data on a server in a network instead of
a self-managed server, and can access it from
anywhere via a network. However, this incurs some
security risks, including server or network failure, in
which the users cannot access their data stored on the
cloud system. Furthermore, because attacks also are
concentrated on the data storage location, the risk of
information leakage increases. In particular, in
situation where confidential business information is
compromised, the leak can cause serious damage.
To counteract those risks, data encryption is
recommended. In addition, the saved encryption data
is often assumed to be applicable to secrecy
calculations without the recovery of the secret data in
the cloud system. Therefore, some cloud systems
consider applying the “secret sharing scheme”
(Shamir, 1979), (Blakley, 1984) to solve the
abovementioned problems.
Shamir’s , secret sharing scheme (Shamir,
1979) is a prototypical secret sharing scheme, that
distributes n shares of a secret and recovers the secret
from shares. This implies that no secret is revealed
if shares are not revealed, and a secret can be
restored even if shares are lost because of a
server or network failure. In addition, the secrecy
calculation based on the scheme is performed at high
speed. Therefore, Shamir’s , secret sharing
scheme is suitable for cloud computing systems.
Secrecy calculation (Asharov, 2012), (Beaver,
1991), (Ben-Sasson, 2011), (Ben-Or, 1988) is a
technique for performing a computation while
keeping the input data secret. It is well known that
secrecy addition and subtraction can be easily
realized using Shamir’s , secret sharing scheme.
However, in secrecy multiplication, the degree of
polynomial would change from 1 to 2 2
because a multiplication of shares is a multiplication
between polynomials with a degree of 1.
Therefore, the threshold value changes only when
secrecy multiplication is performed.
In this paper, we propose a new secrecy
multiplication scheme without changing the degree of
polynomials. The scheme generates a scalar value
called concealed secret, which multiplies a secret by
a random number, and distributes the concealed
secret by using a secret sharing scheme. When
multiplying, we temporarily reconstruct the
concealed secret and multiply it with a share. Thus,
we can perform secrecy multiplication without