首页> 外文会议>CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes >Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme
【24h】

Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme

机译:(k,n)门限乘法秘密共享方案的密码分析

获取原文

摘要

Shamir's secret-sharing scheme is an important building block of modern cryptography. However, since multiplication between two variables is not linear, how to confidentially and efficiently multiply two shared secrets remains an open problem. Recently, Taihei et al. presented a feasible (k, n)-threshold secret-sharing protocol which is capable of achieving such product result even if only $k$ servers are available. Nevertheless, we argue their scheme is vulnerable that the threshold property can not withstand collaborative attacks. Thus accordingly, in this paper, we designed a practical cracking method against their scheme. In terms of intensive analysis, it can be see that our scheme is able to efficiently reveal the shared secret with high probability albeit less than $k$ servers are compromised.
机译:Shamir的秘密共享方案是现代密码学的重要组成部分。但是,由于两个变量之间的乘积不是线性的,因此如何秘密有效地乘以两个共享机密仍然是一个未解决的问题。最近,Taihei等人。提出了可行的(k,n)阈值秘密共享协议,即使仅 $ k $ 服务器可用。但是,我们认为他们的方案很容易受到攻击,即阈值属性无法承受协作攻击。因此,在本文中,我们针对他们的方案设计了一种实用的破解方法。从深入分析的角度来看,可以看出我们的方案能够以较高的概率有效地揭示共享秘密,尽管小于 $ k $ 服务器受到威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号