Proactive Secret Sharing with a dishonest majority

Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

In standard Secret Sharing (SS) a dealer shares a secret s among n parties such that an adversary corrupting no more than t parties does not learn s, while any t + 1 parties can efficiently recover s. Over a long period of time all parties may be corrupted and the threshold t may be violated, which is accounted for in Proactive Secret Sharing (PSS). PSS retains confidentiality even when a mobile adversary corrupts all parties over the lifetime of the secret, but no more than a threshold t during a certain window of time, called the refresh period. Existing PSS schemes only guarantee secrecy in the presence of an honest majority with at most n/2 − 1 total corruptions during such a refresh period; an adversary that corrupts a single additional party beyond the n/2−1 threshold, even if only passively and only temporarily, obtains the secret. We develop the first PSS scheme secure in the presence of a dishonest majority. Our PSS scheme is robust and secure against t < n−2 passive adversaries when there are no active corruptions, and secure but nonrobust (but with identifiable aborts) against t < n/2 − 1 active adversaries when there are no additional passive corruptions. The scheme is also secure (with identifiable aborts) against mixed adversaries controlling a combination of passively and actively corrupted parties such that if there are k active corruptions there are less than n−k−2 total corruptions. Our scheme achieves these high thresholds with O(n4) communication when sharing a single secret. We also observe that communication may be reduced to O(n3) when sharing O(n) secrets in batches. Our work is the first result demonstrating that PSS tolerating such high thresholds and mixed adversaries is possible.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings
EditorsRoberto De Prisco, Vassilis Zikas
PublisherSpringer Verlag
Pages529-548
Number of pages20
ISBN (Print)9783319446172
DOIs
StatePublished - 1 Jan 2016
Event10th International Conference on Security and Cryptography for Networks, SCN 2016 - Amalfi, Italy
Duration: 31 Aug 20162 Sep 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9841 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Security and Cryptography for Networks, SCN 2016
Country/TerritoryItaly
CityAmalfi
Period31/08/162/09/16

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Proactive Secret Sharing with a dishonest majority'. Together they form a unique fingerprint.

Cite this