Cryptology ePrint Archive: Report 2014/184
SETUP in Secret Sharing Schemes using Random Values
Ruxandra F. Olimid
Abstract: Secret sharing schemes divide a secret among multiple participants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Protection) attack can be embedded in secret sharing schemes that employ enough randomness to give the attacker an overwhelming advantage to access the secret. In case of ideal schemes, a coalition of a few participants (within at least one is the attacker) can succeed the attack, while in case of non-ideal schemes the attacker's knowledge can be enough to reveal the secret. We exemplify the attack against Shamir's threshold scheme, which is the most well-known and used secret sharing scheme. Finally, we consider some prevention techniques against the proposed attack.
Category / Keywords: Secret Sharing, SETUP, Black-Box Cryptography
Date: received 9 Mar 2014, last revised 3 Jun 2014
Contact author: ruxandra olimid at fmi unibuc ro
Available format(s): PDF | BibTeX Citation
Version: 20140603:195457 (All versions of this report)
Short URL: ia.cr/2014/184
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]