Secret Sharing for General Access Structure İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Information Security and Cryptology, Ankara, Turkey, May.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Basic Number Theory.
Introduction to Modern Cryptography, Lecture 11 1) More about efficient computation: Montgomery arithmetic, efficient exponentiation 2)Secret Sharing schemes.
Computability and Complexity
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Session 4 Asymmetric ciphers.
Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project.
CSC2110 Discrete Mathematics Tutorial 5 GCD and Modular Arithmetic
An Efficient Construction of Secret Sharing for Generalized Adversary Structure and Its Reduction Communications, Circuits and Systems, ICCCAS 2004.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
Chapter II. THE INTEGERS
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Complexity1 Pratt’s Theorem Proved. Complexity2 Introduction So far, we’ve reduced proving PRIMES  NP to proving a number theory claim. This is our next.
Secret Sharing Algorithms
Congruence of Integers
Introduction Polynomials
Lecture 3.2: Public Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
The RSA Algorithm Rocky K. C. Chang, March
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright © The McGraw-Hill Companies, Inc. Permission required.
9/2/2015Discrete Structures1 Let us get into… Number Theory.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Exam 2 Review 8.2, 8.5, 8.6, Thm. 1 for 2 roots, Thm. 2 for 1 root Theorem 1: Let c 1, c 2 be elements of the real numbers. Suppose r 2 -c 1.
Exam 2 Review 7.5, 7.6, |A1  A2  A3| =∑|Ai| - ∑|Ai ∩ Aj| + |A1∩ A2 ∩ A3| |A1  A2  A3  A4| =∑|Ai| - ∑|Ai ∩ Aj| + ∑ |Ai∩ Aj ∩ Ak| - |A1∩
1 Public-Key Cryptosystems Based on Composite Degree Residuosity Classes Author: Pascal Paillier Presenter: 廖俊威 [Published in J. Stern, Ed., Advances in.
Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions.
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
The Complexity of Primality Testing. What is Primality Testing? Testing whether an integer is prime or not. – An integer p is prime if the only integers.
Factorization of a 768-bit RSA modulus Jung Daejin Lee Sangho.
1 離散對數密碼系統 交通大學資訊工程系 陳榮傑. 2 Outline 離散對數問題 (Discrete Logarithm Problem) 離散對數演算法 (DL Algorithms) –A trivial algorithm –Shanks’ algorithm –Pollard’s algorithm.
IELM 511: Information System design Introduction Part 1. ISD for well structured data – relational and other DBMS Part 2. ISD for systems with non-uniformly.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Great Theoretical Ideas in Computer Science.
Exploiting Vanishing Polynomials for Equivalence Verification of Fixed-Size Arithmetic Datapaths GIEE, NTU ALCom Lab Presenter: 陳炳元.
Exploiting Vanishing Polynomials for Equivalence Verification of Fixed-Size Arithmetic Datapaths GIEE, NTU ALCom Lab Presenter: 陳炳元.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Elements of Coding and Encryption 1. Encryption In the modern word, it is crucial that the information is transmitted safely. For example, Internet purchases,
Discrete Mathematics Section 3.7 Applications of Number Theory 大葉大學 資訊工程系 黃鈴玲.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Tuesday’s lecture: Today’s lecture: One-way permutations (OWPs)
Module #9 – Number Theory 1/5/ Algorithms, The Integers and Matrices.
Great Theoretical Ideas in Computer Science for Some.
Modular Arithmetic and the RSA Cryptosystem Great Theoretical Ideas In Computer Science John LaffertyCS Fall 2005 Lecture 9Sept 27, 2005Carnegie.
Chapter 13 Mathematic Structures 13.1 Modular Arithmetic Definition 1 (modulo). Let a be an integer and m be a positive integer. We denoted by a mod m.
Great Theoretical Ideas In Computer Science COMPSCI 102 Fall 2010 Lecture 16October 27, 2010Duke University Modular Arithmetic and the RSA Cryptosystem.
RSA Cryptosystem Great Theoretical Ideas In Computer Science S. Rudich V. Adamchik CS Spring 2006 Lecture 8Feb. 09, 2006Carnegie Mellon University.
1 Discrete Structures – CNS2300 Text Discrete Mathematics and Its Applications Kenneth H. Rosen (5 th Edition) Chapter 2 The Fundamentals: Algorithms,
CS480 Cryptography and Information Security
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Number-Theoretic Algorithms
Mathematical Background for Cryptography: Modular arithmetic and gcd
Public Key Encryption Major topics The RSA scheme was devised in 1978
CS480 Cryptography and Information Security
Topic 12: Number Theory Basics (2)
Prelude to Public-Key Cryptography
Advanced Algorithms Analysis and Design
3.7 The Real Zeros of a Polynomial Function
Cryptology Design Fundamentals
Cryptology Design Fundamentals
3.7 The Real Zeros of a Polynomial Function
Problem Solving 4.
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Efficient Huffman Decoding
Presentation transcript:

Secret Sharing for General Access Structure İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Information Security and Cryptology, Ankara, Turkey, May 2010.

Outline Multipartite access structure Relate work: – Asmuth-Bloom’s (t, n) secret sharing scheme – Galibus and Matveev (GM) algorithm for polynomial ring in General Access Structure (based on M) Proposed method – Proposed 1: Modified GM algorithm for integer (based on A-B) – Proposed 2: Splitting-based secret sharing scheme Conclusion

Multipartite access structure (1/5) The set of players is divided into K different disjoint classes P 1, P 2,…, P K classes; All players of the same class play the same role in the structure.

Multipartite access structure (2/5) K-partite can be represented by a set of K-tuple vectors. Ex: Γ={(3, 4), (4, 2)} – Each vector is an authorized combination, (3, 4) is a authorized combination (4, 2) is the other authorized combination – The ith entry in a vector denoting the required number of participants from P i in that authorized combination. (3, 4) means at least 3 users from P 1 and 4 from P 2. – {(|P 1 |  3 and |P 2 |  4) or (|P 1 |  4 and |P 2 |  2)}

Multipartite access structure (3/5) Ex: Γ={(3, 4), (4, 2)}, |P 1 |=|P 2 |=5, we can find corresponding (3, 4)  Γ (4, 2)  Γ (2,1)(1,3) (2,2)(2,3) (3,3) (2,4)(4,3) (2,5)(5,3) (3,1)(1,1) (3,2)(2,1) (3,3)(3,1) (3,4)(4,1) (3,5)(5,1)

Multipartite access structure (4/5) Ex:, |P 1 |=|P 2 |=5, we can find corresponding Γ={(3, 4), (4, 2)}, (3,1)(1,6) (3,2)(2,6) (3,3)(3,6) (3,4)(4,6) (3,5)(5,6) (6,1)(1,2) (6,2)(2,2) (6,3)(3,2) (6,4)(4,2) (6,5)(5,2) (4,1)(1,4) (4,2)(2,4) (4,3)(3,4) (4,4) (4,5)(5,4)

Multipartite access structure (5/5) Any access structure defined on a set of n users is trivially n-partite – We can always take P 1 = {1}, …,P n = {n}. – But, we usually want to consider the minimum possible number of classes. Ex1: (2,3)-threshold transform to 3-partite – Γ={(1,1,0), (1,0,1),(0,1,1)} Ex2: Γ={{1,4}, {2,3}} transform to 4-partite – Γ={(1,0,0,1), (0,1,1,0)}

questations 1.Multiple assignment 是否只對 Shamir 有意 義 ?( 因為 CRT 可輕易合併 share ,沒有多個 share 問題 ) – 考慮 information rate 2.CRT 是否就是 single assignment? 3.CRT 如何解 GAS

[ 補充 ]access structures Threshold access structures [1], Access structures defined by graphs [2], Star access structures [3], Those with at most five players [4], Bipartite access structures [5], Hierarchical threshold access structures [6, 7], Weighted threshold access structures [8]. Reference to :2006_New results on multipartite access structures

Relate work Asmuth-Bloom secret sharing scheme – C. Asmuth and J. Bloom. “A modular approach to key safeguarding,“ IEEE Transactions on Information Theory, 29(2):208–210, – The property of (  n/2 , n) Asmuth-Bloom sequence – K. Kaya and A. A. Selcuk. A veriable secret sharing scheme based on the Chinese Remainder Theorem. In Proc. of INDOCRYPT 2008, volume 5365 of LNCS, pages 414–425. Springer-Verlag, Galibus and Matveev (GM) algorithm for polynomial ring – T. Galibus and G. Matveev. “Generalized Mignotte’s sequences over polynomial rings,“ Electronic Notes on Theoretical Computer Science, 186:43–48, 2007.

Asmuth-Bloom’s (t, n) secret sharing scheme (1/4) Based on the Chinese Remainder Theorem(CRT) (t, n) Asmuth-Bloom sequence: – a public sequence of coprime integers m 0 < m 1 < …< m n such that Qualified Min t m 1, m 2,…, m t Forbidden Max t  1 m n, m n  1,…, m n  t+2

Asmuth-Bloom’s (t, n) secret sharing scheme (2/4) Based on the Chinese Remainder Theorem(CRT) (t, n) Asmuth-Bloom sequence: – a public sequence of integers m 0 < m 1 < …< m n such that S j be the set of all subsets of P={1,2,…,n} of cardinality j. Compare with coprime integers

(t, n) secret sharing encoded: – Secret d  Z m 0 – y = d + Am 0 where A is a random positive integer such that y < M – Share y i = y mod m i for all 1  i  n Asmuth-Bloom’s (t, n) secret sharing scheme(3/4) Qualified Min t m 1, m 2,…, m t

(t, n) secret sharing decoded: – y is the unique solution modulo M of the system – Secret d = y mod m 0 Asmuth-Bloom’s (t, n) secret sharing scheme(4/4)

(  n/2 , n) Asmuth-Bloom sequence Lemma: An (  n/2 , n) Asmuth-Bloom sequence is a (k, n) Asmuth-Bloom sequence for all k such that 1  k  n. – Let t =  n/2  – Case1: Let 1  k < t. – Case2: Let t < k  n. 1 t n k Case 1Case 2 k

(  n/2 , n) Asmuth-Bloom sequence Let t =  n/2  Case1: Let 1  k < t. get 1 t n k Case 1

(  n/2 , n) Asmuth-Bloom sequence Let t =  n/2  Case2: Let t < k  n. get 1 t n k Case 2

Galibus and Matveev (GM) algorithm For polynomials, any access structure can be realized by using Mignotte SSS – for polynomial ring – in General Access Structure – (based on Mignotte’s sequence) Secret d, moduli m i, and shares y i are polynomials.

Galibus and Matveev (GM) algorithm Initial: m i (x) =1, for 1  i  n Iteration:

Proposed method Proposed 1: Modified GM algorithm for integer (based on A-B) Proposed 2: Splitting-based secret sharing scheme

Proposed 1: Modified GM algorithm for integer Based on A-B, find a prime m 0 (for specified bit length) For each, check all – Find prime p, and bit length of p is minimal 修改 : 符合標準 有問題

Proposed 2: Splitting-based secret sharing scheme k-partite, each part Pi has it’s (  n i /2 , n i ) Asmuth-Bloom sequence For each vector (authorized combination) – Using A-B’s scheme sharing subsecret d v,i into share y v,i For each participant l,