Paper 2014/184

SETUP in Secret Sharing Schemes using Random Values

Ruxandra F. Olimid

Abstract

Secret sharing schemes divide a secret among multiple participants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Protection) attack can be embedded in secret sharing schemes that employ enough randomness to give the attacker an overwhelming advantage to access the secret. In case of ideal schemes, a coalition of a few participants (within at least one is the attacker) can succeed the attack, while in case of non-ideal schemes the attacker's knowledge can be enough to reveal the secret. We exemplify the attack against Shamir's threshold scheme, which is the most well-known and used secret sharing scheme. Finally, we consider some prevention techniques against the proposed attack.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Secret SharingSETUPBlack-Box Cryptography
Contact author(s)
ruxandra olimid @ fmi unibuc ro
History
2014-06-03: last of 2 revisions
2014-03-09: received
See all versions
Short URL
https://ia.cr/2014/184
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/184,
      author = {Ruxandra F.  Olimid},
      title = {{SETUP} in Secret Sharing Schemes using Random Values},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/184},
      year = {2014},
      url = {https://eprint.iacr.org/2014/184}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.