Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves

Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves

Hichem Bouchakour Errahmani, Hind Ikni
Copyright: © 2020 |Pages: 18
DOI: 10.4018/IJSI.2020070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In distributed systems, as any network architecture, cryptography has a vital role in communication security, and sharing a secret represents a jump in this field where the secret depends on a group instead of a single person. In this article, the authors propose a method to share a multi secrets matrix represented by an image, that could be reconstructed without any loss by an access structure over a distributed system. The presented approach has a verifiable property, where each candidate possesses the advantage to verify the validity of his shadow. The security level of the scheme is based on elliptic curve discrete logarithm problem and the opportunity of allowing each side to generate a private sub-secret key for the sharing. The benefit of this method is justified by the absence of information loss and a lower timing results.
Article Preview
Top

Introduction

Classical cryptography treats the notions of encryption, decryption, and hashing using secret keys are the actors of the cryptosystem. Those keys represent the security basis of the entire system according to Kerckhoffs principles. On the other hand, the question that could arises in our mind, is how to protect such an important key? Hence, the notion of threshold secret sharing, where the key is distributed over a group of participants in such a way that none of them possesses an information about the secret, but some candidates representing the access structure collaborate at its reconstitution. Several works have contributed to improve secret sharing since the first approach of Adi Shamir, such as verifiable approaches and proactive ones. However, the particularity of contemporary methods lies in the use of elliptic curves, for the reason that they revolutionized cryptosystems security by providing solutions to constraints caused by key size and operations complexity. In this paper, the researchers propose a method of securing visual cryptographic keys by multi secrets sharing scheme with self-selecting of private ones, based on ECDLP. The scheme takes as input an image matrix which represent the secret to share on a server–client network without information loss. In this method, the authors give the participants the capability to verify their received shares without secret reconstruction, to prove the validity of the dealer, shadows, and even candidates. The rest of the paper is structured as follows: Section II illustrates preliminaries technics for a good comprehension of the subject. Section III presents related works for sharing secrets using elliptic curves. Section VI describes steps of the proposed approach. Section V discuses results. Finally, section IV concludes and resumes the paper.

Preliminaries

In this section, the authors describe basic technics used for secret sharing with elliptic curves.

Elliptic Curve

An elliptic curve IJSI.2020070104.m01 over a finite field IJSI.2020070104.m02 is a set of pairs IJSI.2020070104.m03 resolving the Equation IJSI.2020070104.m04 union a particular element called point at infinity noted IJSI.2020070104.m05 such that IJSI.2020070104.m06 and IJSI.2020070104.m07 (Paar, 2009) (Figure 1).

Some operations properties over IJSI.2020070104.m08 should be mentioned:

  • 1.

    Closure: IJSI.2020070104.m09, ifIJSI.2020070104.m10thenIJSI.2020070104.m11;

  • 2.

    Associativity:IJSI.2020070104.m12;

  • 3.

    Identity element: IJSI.2020070104.m13, IJSI.2020070104.m14;

  • 4.

    Inverse element: IJSI.2020070104.m15, IJSI.2020070104.m16;

  • 5.

    Commutativity: IJSI.2020070104.m17;IJSI.2020070104.m18.

By inference: IJSI.2020070104.m19 forms an abelian group.

The addition law in IJSI.2020070104.m20 is defined as follows.

For each IJSI.2020070104.m21 and IJSI.2020070104.m22:

IJSI.2020070104.m23
and:
IJSI.2020070104.m24
such that:
IJSI.2020070104.m25
the inverse of point IJSI.2020070104.m26 is obtained by IJSI.2020070104.m27.

Figure 1.

Elliptic curve over R (a) and over Finit Field F_p (b)

IJSI.2020070104.f01

Several classical asymmetric cryptosystems are based on Discret Logarithm Problem (DLP):

IJSI.2020070104.m28 so IJSI.2020070104.m29

Applying the same principle in a set of points of an alliptic curve IJSI.2020070104.m30 on a finite field IJSI.2020070104.m31, a similar problem could be observed, the Elliptic Curve Discrete Logarithm Problem (ECDLP), noting that the set of points represents a cyclic group by applying a succession of addition operations:

IJSI.2020070104.m32 so IJSI.2020070104.m33

By analogy with the DLP, IJSI.2020070104.m34 is considered as a base point of the cyclic group, and IJSI.2020070104.m35 the elliptic discret logarithm of IJSI.2020070104.m36, where IJSI.2020070104.m37 and IJSI.2020070104.m38. Given a large prime number IJSI.2020070104.m39, finding IJSI.2020070104.m40 can not be done in less than IJSI.2020070104.m41 steps (Hoffstein, 2008).

Shamir’s Threshold Secret Sharing Scheme

A threshold secret sharing scheme consists to split a secret key and distribute it among IJSI.2020070104.m42 participants in such a way its reconstitution requires only a qualified group of them.

In its paper, (Shamir, 1979) describes the conditions of a threshold IJSI.2020070104.m43 sharing system:

  • Knowledge of any IJSI.2020070104.m44 or more pieces of the secret, makes it easily computable;

  • Knowledge of any IJSI.2020070104.m45 or fewer pieces of the secret, reveal no information about the secret.

To share a secret IJSI.2020070104.m46 among IJSI.2020070104.m47 persons with a threshold IJSI.2020070104.m48, a random polynomial of IJSI.2020070104.m49 degree should be defined:

IJSI.2020070104.m50
in which IJSI.2020070104.m51 and IJSI.2020070104.m52.

To determine the different shares, IJSI.2020070104.m53 points IJSI.2020070104.m54 must be computed, and for the reconstruction phase, it is possible using Lagrange interpolation for IJSI.2020070104.m55 given shares:

IJSI.2020070104.m56

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing