ation is. We now discuss the speeding up in more
details.
One topic is focusing on optimizing the Shamir
library to reduce the execution time. In addition,
the message parsing needs to be optimized as cur-
rently it is required for the system to parse the en-
tire raw message contents to get attachments on in-
coming messages. In the future, this may be made
more simple through expanded WebExtension APIs.
Currently, due to the recent major version change and
add-on overhaul, the Thunder WebExtension APIs do
not have any direct access to message attachments.
Another potential route for optimization is selecting
another secret sharing scheme that may be more op-
timized for a JavaScript implementation and for file
sizes of up to a few megabytes. Finally, alternative
universal hashing functions should be considered.
REFERENCES
(1993). A proposed federal information processing standard
for an escrowed encryption standard (ees). Federal
Register.
(1994). Department of justice briefing re escrowed encryp-
tion standard. Department of Commerce, Washington
D.C.
(2021). “add-on developers.” topicbox.com. [online]. https:
//thunderbird.topicbox.com/groups/addons.
(2021a). Thunderbird webextension apis - thun-
derbird webextensions latest documentation.
readthedocs.io. [Online]. Available at https://
thunderbird-webextensions.readthedocs.io/en/latest/.
(2021b). Web crypto api. Mozilla Developer Network [On-
line]. Available: https://developer.mozilla.org/en-US/
docs/Web/API/Web Crypto API.
(2022). Proposed thunderbird add-on. [On-
line]. Available: https://github.com/NTSAS/
Thunderbird-Secret-Sharing.
Afanassiev, V., Gehrmann, C., and Smeets, B. (1997).
Fast message authentication using efficient polyno-
mial evaluation. In Biham, E., editor, Fast Soft-
ware Encryption, pages 190–204, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Attasena, V., D. J. and Harbi, N. (2017). Secret sharing
for cloud data security: a survey. The VLDB Journal,
26:657—-681.
Bierbrauer, J., Johansson, T., Kabatianskii, G., and Smeets,
B. (1994). On families of hash functions via geometric
codes and concatenation. In Stinson, D. R., editor,
Advances in Cryptology — CRYPTO’ 93, pages 331–
342, Berlin, Heidelberg. Springer Berlin Heidelberg.
Blakley, G. R. (1979). Safeguarding cryptographic keys. In
1979 International Workshop on Managing Require-
ments Knowledge (MARK), pages 313–318.
Carter, J. and Wegman, M. N. (1979). Universal classes
of hash functions. Journal of Computer and System
Sciences, 18(2):143–154.
Dolev, D., Dwork, C., Waarts, O., and Yung, M. (1993).
Perfectly secure message transmission. J. ACM,
40(1):17–47.
Franklin, M. K. and Wright, R. N. (2000). Secure commu-
nication in minimal connectivity models. Journal of
Cryptology, 13:9–30.
Johansson, T., Kabatianskii, G., and Smeets, B. (1994). On
the relation between a-codes and codes correcting in-
dependent errors. In Helleseth, T., editor, Advances in
Cryptology — EUROCRYPT ’93, pages 1–11, Berlin,
Heidelberg. Springer Berlin Heidelberg.
Krovetz, T. and Rogaway, P. (2001). Fast universal hash-
ing with small keys and no preprocessing: The polyr
construction. In Won, D., editor, Information Security
and Cryptology — ICISC 2000, pages 73–89, Berlin,
Heidelberg. Springer Berlin Heidelberg.
Liu, C. L. (1968). Introduction to Combinatorial Mathe-
matics. Computer science series. McGraw-Hill.
Oren, Y. and Wool, A. (2009). Perfect privacy
for webmail with secret sharing. Techni-
cal Report, Tel-Aviv University, Available at
https://85c6e2e3-099c-4499-b7e5-046bb17abf53.
filesusr.com/ugd/5dd4a3
318130cb05614ab58e275c1d5994247f.pdf.
Rabin, T. and Ben-Or, M. (1989). Verifiable secret sharing
and multiparty protocols with honest majority. In Pro-
ceedings of the Twenty-First Annual ACM Symposium
on Theory of Computing, STOC ’89, page 73–85, New
York, NY, USA. Association for Computing Machin-
ery.
Rempe, G. (2019). Secret sharing for javascript.
github.com. [Online] Available at https://github.com/
grempe/secrets.js.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Simmons, G. J. (1990). Prepositioned shared secret and/or
shared control schemes. In Quisquater, J.-J. and Van-
dewalle, J., editors, Advances in Cryptology — EU-
ROCRYPT ’89, pages 436–467, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Tompa, M. and Woll, H. (1987). How to share a se-
cret with cheaters. In Proceedings on Advances
in Cryptology—CRYPTO ’86, page 261–265, Berlin,
Heidelberg. Springer-Verlag.
Vernam, G. S. (1926). Cipher printing telegraph systems
for secret wire and radio telegraphic communications.
Transactions of the American Institute of Electrical
Engineers, XLV:295–301.
Wegman, M. N. and Carter, J. (1981). New hash functions
and their use in authentication and set equality. Jour-
nal of Computer and System Sciences, 22(3):265–279.
ˇ
Cu
ˇ
r
´
ık, P., Ploszek, R., and Zajac, P. (2022). Practical use of
secret sharing for enhancing privacy in clouds. Elec-
tronics, 11(17).
SECRYPT 2023 - 20th International Conference on Security and Cryptography
182