【24h】

Game-Based Security Proofs for Secret Sharing Schemes

机译:秘密共享方案的基于游戏的安全证据

获取原文

摘要

Secret sharing schemes allow the secret to be shared among a group of parties, so that a quorum of these parties can work together to recover the secret, but less number of parties cannot learn any information of the secret. In the literature, secret sharing schemes are normally analysed using heuristic arguments rather than strict security proofs. However, such a method may overlook some security flaws, especially when it is used to analyse the secrecy property. In this paper, we illustrate this issue using some concrete examples. We show that in two existing secret sharing schemes, the secrecy property was originally conjectured to be satisfied, but the adversary still can employ some security flaws to violate this property. We then introduce a game-based model that can be used to formally analyse the secrecy property in secret sharing schemes. We prove that our model captures the definition of the secrecy property. And as an example, we show how our method can be used to analyse Shamir secret sharing scheme. Note that our method might find applications in other secret sharing schemes as well.
机译:秘密共享方案允许一组成员之间共享的秘密,让这些当事人的仲裁可以一起追的秘密,但不太各方的数量不能得知秘密的任何信息。在文献中,秘密共享方案一般分析采用启发式的论点,而不是严格的安全性证明。然而,这样的方法可以忽略一些安全缺陷,特别是当它被用于分析的保密性。在本文中,我们说明使用一些具体的例子这一问题。我们发现,在现有的两个秘密共享方案,最初推测的保密特性得到满足,但还是对手可以采用一些安全漏洞,违反此属性。然后,我们介绍了基于游戏的模型,可用于正式分析秘密共享方案的保密性能。我们证明了我们的模型捕捉保密属性的定义。作为一个例子,我们将展示我们的方法如何被用来分析沙米尔秘密共享方案。请注意,我们的方法可能会发现其他秘密共享方案的应用也是如此。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号