Game-Based Security Proofs for Secret Sharing Schemes

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secret sharing schemes allow the secret to be shared among a group of parties, so that a quorum of these parties can work together to recover the secret, but less number of parties cannot learn any information of the secret. In the literature, secret sharing schemes are normally analysed using heuristic arguments rather than strict security proofs. However, such a method may overlook some security flaws, especially when it is used to analyse the secrecy property. In this paper, we illustrate this issue using some concrete examples. We show that in two existing secret sharing schemes, the secrecy property was originally conjectured to be satisfied, but the adversary still can employ some security flaws to violate this property. We then introduce a game-based model that can be used to formally analyse the secrecy property in secret sharing schemes. We prove that our model captures the definition of the secrecy property. And as an example, we show how our method can be used to analyse Shamir secret sharing scheme. Note that our method might find applications in other secret sharing schemes as well.

Cite

CITATION STYLE

APA

Xia, Z., Yang, Z., Xiong, S., & Hsu, C. F. (2020). Game-Based Security Proofs for Secret Sharing Schemes. In Advances in Intelligent Systems and Computing (Vol. 895, pp. 650–660). Springer Verlag. https://doi.org/10.1007/978-3-030-16946-6_53

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free