Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography

HTML  XML Download Download as PDF (Size: 178KB)  PP. 22-29  
DOI: 10.4236/ijcns.2014.71003    3,288 Downloads   5,533 Views  Citations
Author(s)

ABSTRACT


In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares; and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.


Share and Cite:

L. Harn and C. Lin, "Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography," International Journal of Communications, Network and System Sciences, Vol. 7 No. 1, 2014, pp. 22-29. doi: 10.4236/ijcns.2014.71003.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.