Security of linear secret-sharing schemes against mass surveillance

4Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion.

Cite

CITATION STYLE

APA

Giacomelli, I., Olimid, R. F., & Ranellucci, S. (2015). Security of linear secret-sharing schemes against mass surveillance. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9476, pp. 43–58). Springer Verlag. https://doi.org/10.1007/978-3-319-26823-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free