保密
数学证明
秘密分享
计算机科学
财产(哲学)
可验证秘密共享
计算机安全
安全多方计算
方案(数学)
理论计算机科学
密码学
对手
数学
认识论
数学分析
哲学
集合(抽象数据类型)
程序设计语言
几何学
作者
Zhe Xia,Zhen Yang,Shengwu Xiong,Ching-Fang Hsu
出处
期刊:Advances in intelligent systems and computing
日期:2019-04-16
卷期号:: 650-660
被引量:3
标识
DOI:10.1007/978-3-030-16946-6_53
摘要
Secret sharing schemes allow the secret to be shared among a group of parties, so that a quorum of these parties can work together to recover the secret, but less number of parties cannot learn any information of the secret. In the literature, secret sharing schemes are normally analysed using heuristic arguments rather than strict security proofs. However, such a method may overlook some security flaws, especially when it is used to analyse the secrecy property. In this paper, we illustrate this issue using some concrete examples. We show that in two existing secret sharing schemes, the secrecy property was originally conjectured to be satisfied, but the adversary still can employ some security flaws to violate this property. We then introduce a game-based model that can be used to formally analyse the secrecy property in secret sharing schemes. We prove that our model captures the definition of the secrecy property. And as an example, we show how our method can be used to analyse Shamir secret sharing scheme. Note that our method might find applications in other secret sharing schemes as well.
科研通智能强力驱动
Strongly Powered by AbleSci AI