TY - JOUR
T1 - Revisiting group oriented secret sharing schemes
AU - Xu, Rui
AU - Wang, Xu
AU - Morozov, Kirill
AU - Cheng, Chi
AU - Ding, Jintai
N1 - Publisher Copyright:
© 2021 Elsevier Inc.
PY - 2022/4
Y1 - 2022/4
N2 - In a (t,n) threshold scheme any t or more shares can reconstruct the secret s, but less than t shares reveal no information about s. However, an unauthenticated adversary can pretend to be the shareholder at the reconstruction stage. If there were more than t honest shareholders, the unauthenticated adversary without valid share can obtain the secret. To deal with this type of attacks, a model of (t,m,n) group oriented secret sharing (GOSS) scheme was proposed by Miao et al. in 2015. Here the group oriented property means that if m>t parties try to reconstruct the secret, they should all have the authentic shares in advance. It was claimed by Miao et al. that the group oriented property in their GOSS schemes holds in the information-theoretic sense. In this paper, we revisit two instantiations of (t,m,n) group oriented secret sharing schemes and show that these constructions cannot provide the so-called “group oriented property”. Specifically, we develop concrete attacks which allow an unauthenticated adversary with no valid share to participate in the reconstruction phase and obtain the secret provided that there are at least t honest shares presented at the reconstruction phase.
AB - In a (t,n) threshold scheme any t or more shares can reconstruct the secret s, but less than t shares reveal no information about s. However, an unauthenticated adversary can pretend to be the shareholder at the reconstruction stage. If there were more than t honest shareholders, the unauthenticated adversary without valid share can obtain the secret. To deal with this type of attacks, a model of (t,m,n) group oriented secret sharing (GOSS) scheme was proposed by Miao et al. in 2015. Here the group oriented property means that if m>t parties try to reconstruct the secret, they should all have the authentic shares in advance. It was claimed by Miao et al. that the group oriented property in their GOSS schemes holds in the information-theoretic sense. In this paper, we revisit two instantiations of (t,m,n) group oriented secret sharing schemes and show that these constructions cannot provide the so-called “group oriented property”. Specifically, we develop concrete attacks which allow an unauthenticated adversary with no valid share to participate in the reconstruction phase and obtain the secret provided that there are at least t honest shares presented at the reconstruction phase.
KW - Cryptanalysis
KW - Group oriented secret sharing
KW - LWE
KW - Secret sharing
UR - http://www.scopus.com/inward/record.url?scp=85122682636&partnerID=8YFLogxK
U2 - 10.1016/j.ins.2021.12.053
DO - 10.1016/j.ins.2021.12.053
M3 - Article
AN - SCOPUS:85122682636
SN - 0020-0255
VL - 589
SP - 751
EP - 769
JO - Information Sciences
JF - Information Sciences
ER -