Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
Takato Imai, Keiichi Iwamura
2019
Abstract
Conventional secret sharing schemes, such as Shamir's secret sharing scheme, cannot prevent the leak of shares when they are deposited on servers. In contrast, in an asymmetric secret sharing scheme, the owner of the secret has a stronger authority than the server, and the number of servers storing the share can be set to less than k. Therefore, even if all the shares stored in the server leak, the secret is not leaked. This can prevent the leakage of secrets from attacks on servers. In the conventional secret sharing scheme, a correct secret cannot be reconstructed if the attacker outputs a false share at the time of reconstruction by hijacking the server. This problem cannot be addressed even if asymmetric secret sharing is used. Therefore, we extend the asymmetric secret sharing scheme in a manner enabling the owner to detect a secret when an attacker outputs a false share. In the proposed scheme, a server is not required to store information other than the share if n > k. In other words, no burden is imposed on the server for verification. In addition, the hijacked servers can be identified under certain conditions, realizing an efficient verification method for secrets that is suitable for the asymmetric secret sharing scheme.
DownloadPaper Citation
in Harvard Style
Imai T. and Iwamura K. (2019). Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B, ISBN 978-989-758-378-0, pages 172-179. DOI: 10.5220/0007958201720179
in Bibtex Style
@conference{ice-b19,
author={Takato Imai and Keiichi Iwamura},
title={Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B,},
year={2019},
pages={172-179},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007958201720179},
isbn={978-989-758-378-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B,
TI - Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
SN - 978-989-758-378-0
AU - Imai T.
AU - Iwamura K.
PY - 2019
SP - 172
EP - 179
DO - 10.5220/0007958201720179