Abstract
A generalized Chinese Remainder Theorem (GCRT)-based multi-secret sharing (MSS) scheme, which can solve a tricky problem that the correspondences between multi-secret and their remainders in each share are unclear, has been proposed recently. But potential security issues should be taken into accounts in the design and implementation of MSS. To protect long-lived multi-secret against intended attacks, in this paper, we propose a proactive multi-secret sharing (PMSS) scheme. It consists of share generation, share refreshing, and secret recovery phases. Compared with those existing MSS schemes, unordered shares in the proposed PMSS scheme are refreshed at a fixed period while the multi-secret remains intact. This can lead to a higher security level because an adversary must capture at least t shares from total n shares during a period to crack the secrets. Both the share generation and refreshing phases can be easily realized by using modular operation. What is more, the proposed PMSS scheme has a much less computational load thanks to the use of a lightweight GCRT-based algorithm in the secret recovery phase. Finally, some examples are provided to illustrate the efficiency, and some analyses regarding security are also given.
Similar content being viewed by others
References
Fernandes, G, Jr., Rodrigues, J. J. P. C., et al. (2019). A comprehensive survey on networks anomaly detection. Telecommunication Systems, 70, 447–489.
Shamir, A. (1979). How to share a secret. Communication ACM, 22(11), 612–613.
Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.
McEliece, R. J., & Sarwate, D. V. (1981). On sharing secrets and Reed-Solomon codes. Communication ACM, 24(9), 583–584.
Mignotte, M. (1982). How to share a secret. Workshop on Cryptography, 371–375.
Asmuth, C., & Bloom, J. (1983). A modular approach to key safegurding. IEEE Transactions on Information Theory, 29(2), 208–210.
Liu, Y., Harn, L., & Chang, C.-C. (2015). A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems, 28(7), 1282–1292.
Gong, X., Hu, P., Shum, K. W., & Sung, C. W. (2018). A Zigzag-decodable ramp secret sharing scheme. IEEE Transactions on Information Forensics and Security, 13(8), 1906–1916.
Chang, C.-C., & Li, C.-T. (2019). Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Mathematical Bioscience Engineering, 16, 3367–3381.
Blundo, C., Santis, A. D., & Vaccaro, U. (1993). Efficient sharing of many secrets, annual symposium on theoretical aspects of computer. Science, 665, 692–703.
Harn, L. (1995). Efficient sharing (broadcasting) of multiple secrets. IEE Proceedings Computers and Digital Technique, 142(3), 237–240.
He, J., & Dawson, E. (1994). Multistage secret sharing based on the one-wany function. Electronics Letter, 30(19), 1591–1592.
Harn, L. (1995). Comment: Multistage secret sharing based on the one-wany function. Electronics Letter, 31(4), 262–262.
Pilaram, H., & Eghlidos, T. (2017). An efficient lattice based multi-stage secret sharing scheme. IEEE Transactions on Dependable and Secure Computing, 14(1), 2–8.
Chien, H. Y., Jan, J.-K., & Tseng, Y.-M. (2000). A practical \((t, n)\) multi-secret sharing scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 83(12), 2762–2765.
Yang, C.-C., Chang, T.-Y., & Hwang, M.-S. (2004). A \((t, n)\) multi-secret sharing scheme. Applied Mathematics and Computation, 151(2), 483–490.
Zhao, J., Zhang, J., & Zhao, R. (2007). A practical verifiable multi-secret sharing scheme. Computer Standards and Interfaces, 29(1), 138–141.
Das, A., & Adhikari, A. (2010). An efficient multi-use multi-secret sharing scheme based on hash function. Applied Mathematics Letters, 23(9), 993–996.
Tentu, A. N., Venkaiah, V. C., & Prasad, V. K. (2018). CRT based multi-secret sharing schemes: Revisited. International Journal of Security and Networks, 13(1), 1–9.
Ostrovsky, R., & Yung, M. (1991). How to withstand mobile virus attacks, Proceedings of the Tenth Annual ACM Symposium on Principles of. Distributed Computing, 91, 51–59.
Herzberg, A., Jarecki, S., Krawczyk, H., & Yung, M. (1995). Proactive secret sharing or: How to cope with perpetual leakage. Annual International Cryptology Conference, 339–352.
Zhou, L., Schneider, F. B., & Renesse, R. V. (2005). APSS: Proactive secret sharing in asynchronous systems. ACM Transactions on Information and System Security, 8(3), 259–286.
Schultz, D., & Liskov, B. (2010). MPSS: Mobile proactive secret sharing. ACM Transaction Information System Security, 13(4), 34–65.
Meng, K. J., Meng, K., Ning, Y., Huang, W., Xiong, Y., & Chang, C.-C. (2021). A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers of Computer Science, 15(2), 1–10.
Feng, B., Guo, C., Li, M., & Wang, Z. H. (2015). A novel proactive multi-secret sharing scheme. IJ Network Security, 17(2), 123–128.
Wang, W., Li, X. P., Xia, X.-G., & Wang, W. J. (2015). The largest dynamic range of a generalized Chinese remainder theorem for two integers. IEEE Signal Processing Letter, 22(2), 254–258.
Li, X. P., Chen, H., Liu, Y., & Chang, C.-C. (2020). Unordered multi-secret sharing based on generalized Chinese remainder theorem. Security and Communication Networks, 2020, 6073721.
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (No. 61701086), the Fundamental Research Funds for the Central Universities (No. ZYGX2016KYQD143), and the Project of Ministry of Science and Technology of Taiwan under Grant MOST 106-2221-E-035-013-MY3.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, X., Chang, CC. & Liu, Y. A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network. Telecommun Syst 78, 49–56 (2021). https://doi.org/10.1007/s11235-021-00791-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-021-00791-0