Analyzing Proactive Secret Sharing Schemes

Analyzing Proactive Secret Sharing Schemes

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 7, September - 2012 Analyzing Proactive Secret Sharing Schemes Sonali Patil Nikita Rana Dhara Patel Prajol Hodge Assistant Professor Student Student Student Comp Dept. Pimpri Chinchwad College of Engineering, Pune Abstract tampered. To ensure the integrity and secrecy of the protected information encryption methods are one of There are circumstances where an action is required to the popular approaches. Public key encryption is a be executed by a group of people. The idea of secret powerful mechanism for protecting the confidentiality sharing is to divide a secret into pieces called shares, of secure information. In those methods, secrets can be which are then distributed amongst users by the dealer. protected by more than one key. However, single-point- The shares provided to the participants are generally failure term is one of the critical problems faced in forever. But the need of the applications is to encryption techniques. periodically renew the shares for the same secret to add more security. Also to add new participants For example, enrolling feature is necessary and sometimes dis- enrollment is required to remove the dishonest The secret information cannot be recovered if the decryption key is lost. participants. For example, to transfer money from a The encrypted content is corrupted during the bank a manager and a clerk need to cooperate. A transmission. ballistic missile should only be launched if three officers authorize the action. Proactive secret sharing Backup copies are created to protect cryptographic keys adds more security to all kind of such applications. The from loss or corruption. goal of the pro-active security scheme is to prevent the adversary from learning the secret or from destroying The problem is, the greater the number of copies made, it. The intent of this paper is to provide an analysis of the greater the risk of security exposure, and smaller such proactive secret sharing schemes. The the number of copies made, the greater the chance that comparative study shows there is a need of better all of them are lost. To address these reliability proactive secret sharing schemes. problems, a secret sharing scheme (SSS) is a good alternative to remedy these types of vulnerabilities. Keywords: Secret Sharing, Network security, Secret sharing schemes allows improving the level of Extended Capabilities, Cryptography. protection without increasing the risk of exposure. Secret Sharing is a scheme in which a secret is divided into pieces called shares, which are then distributed 1. Introduction amongst users by the dealer. Only certain groups In communications networks that require security, it is (authorized subsets of participants) can reconstruct the important that secrets be protected by more than one original secret. More formally a Secret Sharing key. In commercial, medical and military systems Scheme (SSS) is a method whereby n pieces of security of sensitive information is essential and is of information called shares or shadows are assigned to a primary concern. Needless to say, it is also important secret key K in such a way that: i)The secret key can be for any information process to ensure data is not being reconstructed from certain authorized groups of shares www.ijert.org 1 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 7, September - 2012 and ii) The secret key cannot be reconstructed from 2. Proactive Secret Sharing Schemes: unauthorized groups of shares. But in some Literature Survey Crux circumstances, secret sharing need to be more flexible like provide proactive features such as to enroll and dis- 2.1 Proactive Secret Sharing: enroll of shareholders, recover lost or corrupted shares and periodically renew shares. The Secret Sharing scheme assumes long-lived shares; however the protection provided by this scheme may be The rest of the paper is organized as follows. In Section insufficient. The security in a system that is exposed to II some definitions are discussed. Section III covers attacks and break-ins might become exhausted; several proactive secret sharing schemes. In section IV faults might occur such as Secrets can be revealed, performances of these schemes based on various Shares can gradually be corrupted / compromised, parameters like ideal, perfect, enrollment, Hardware failure or damage, for example reboot, power disenrollment, updation are analyzed. Finally in section failures etc. V, we summarize this survey based on their comparative results. The goal of the pro-active security scheme is to prevent the adversary from learning the secret or from destroying it, in particular any group of t non-faulty shareholders should be able to reconstruct the secret 1.1 Some Definitions whenever it is necessary. Formal foundation of secret sharing was formulated Proactive secret sharing scheme (PSSS) was introduced using the information theory. Two important concepts to improve security through periodic executions. With were defined based on information rate: ideal and no PSSS, using an (t, n)-threshold secret sharing perfect schemes. scheme, SSS can tolerate up to t-1 compromised shares. Given enough time, a hacker may be able to Information Rate: The information rate was studied compromise enough shares (t or more) to gain the by Stinson [1]. It is a measure of the amount of secret. PSSS is a scheme that allows generating new set information that the participants need to keep secret in of shares for the same secret from the old shares a secret sharing scheme. The information rate for a without reconstructing the secret. Using PSSS, all the particular shareholder is the bit-size ratio (size of the shares are refreshed so that old shares become useless. shared secret) / (size of that user‟s share). The Thus, an adversary has to gather at least t shares information rate for a secret sharing scheme itself is the between two executions of PSSS. The secret remains minimum such rate over all participants [2] [3]. The confidential if fewer than t shares were compromised efficiency of a secret sharing scheme is measured by its from the start of one PSSS to the end of the next PSSS. information rate. The goal of the pro-active security scheme is to prevent the adversary from learning the secret or from Ideal Secret Sharing: Secret sharing schemes with destroying it, In particular any group of t non-faulty information rate 1 are called ideal [4]. Scheme is ideal shareholders should be able to reconstruct the secret if share has the same length as secret. Ideal property whenever it is necessary. can be thought as efficiency. The term pro-active refers to the fact that it's not Perfect: A perfect threshold scheme is a threshold necessary for a breach of security to occur before scheme in which knowing only (t - 1) or fewer shares secrets are refreshed, the refreshment is done reveal no information about Secret S whatsoever, in the periodically (and hence, proactively). information theoretic sense [2] [3]. www.ijert.org 2 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 7, September - 2012 The core properties of pro-active secret sharing: We are briefly describing some PSSS below: To renew existing shares without changing the secret, so that previous exposures of shares will not damage the secret (old shares will 2.2 Shamir’s Secret Sharing Scheme become useless). To recover lost or corrupted shares without compromising the secrecy of the shares. A PSSS based on Shamir [6] secret sharing scheme is Reconstruction of Lost / Corrupted Shares explained in [1]. Shamir [6] developed the idea of a (k, n) threshold-based secret sharing technique (k ≤ n). The technique is to construct a polynomial function of order Pro-active Model requirement: (k − 1) as, An adversary can reveal at most t-1 shares in f(x) = + x + + … + (mod p), any time period (where t-1<n/2. this guarantees the existence of t honest shareholders at any given time). This time where the value is the secret and p is a prime period should be synchronized with the share- number. The secret shares are the pairs of values (xi, renewal protocol. yi) where yi = f(xi), 1 ≤ i ≤ n and 0 < x1 < x2 …< xn ≤ Authenticated broadcast channel. p − 1. The polynomial function f(x) is destroyed after Authenticated and secret communication channels between each two participants. each server Pi possesses a pair of values (xi, yi) so that Synchronization: the servers (shareholders) no single server knows what the secret value is. In can access a common global clock so that the fact, no groups of (k − 1) or fewer secret shares can be protocol can be applied in a certain time used to discover the secret . On the other hand, when period. k or more secret shares are available, we can set up at Shares can be erased: every honest server (shareholder) can erase its shares in a manner least k equations yi = f(xi) with k unknown parameters that no attacker can gain access to erased data. di‟s. The unique solution can be solved. Also, a Lagrange interpolation formula [6] is commonly used to solve the secret value as the following formula Active & Passive attacks: A secret sharing system is still quite vulnerable when a dynamic adversary determines to break into the system before the lifetime of the secret expires. Ben-Or et al. [5] discussed a general theory for the distributed fault tolerance systems and presented some possible solutions to avoid such attacks. Among many different where (xi, yj) are any k shares for 1 ≤ i ≤ k. Shamir‟s classifications of adversary attacks, one of the most SSS is regarded as a perfect SSS because knowing (k − notable ones is to classify the attacks as: Passive 1) linear equations cannot expose any information adversary attacks and Active adversary attacks.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us