Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Dreier, Jannika; * | Dumas, Jean-Guillaumeb | Lafourcade, Pascalc | Robert, Léoc
Affiliations: [a] Université de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France. E-mail: Jannik.Dreier@loria.fr | [b] University Grenoble Alpes, Laboratoire Jean Kuntzmann, CNRS UMR 5224, 38058 Grenoble, France. E-mail: Jean-Guillaume.Dumas@univ-grenoble-alpes.fr | [c] University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubière, France. E-mails: Pascal.Lafourcade@uca.fr, Leo.Robert@uca.fr
Correspondence: [*] Corresponding author. E-mail: Jannik.Dreier@loria.fr.
Abstract: In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient k-out-of-n secret sharing scheme based on Lagrange’s interpolation. Liu and Shamir also claimed that the minimal solution using physical locks is clearly impractical and exponential in the number of participants. In this paper we relax some implicit assumptions in their claim and propose an optimal physical solution to the problem of Liu that uses physical padlocks, but the number of padlocks is not greater than the number of participants. Then, we show that no device can do better for k-out-of-n threshold padlock systems as soon as k⩾2n, which holds true in particular for Liu’s example. More generally, we derive bounds required to implement any threshold system and prove a lower bound of O(log(n)) padlocks for any threshold larger than 2. For instance we propose an optimal scheme reaching that bound for 2-out-of-n threshold systems and requiring less than 2log2(n) padlocks. We also discuss more complex access structures, a wrapping technique, and other sublinear realizations like an algorithm to generate 3-out-of-n systems with 2.5n padlocks. Finally we give an algorithm building k-out-of-n threshold padlock systems with only O(log(n)k−1) padlocks. Apart from the physical world, our results also show that it is possible to implement secret sharing over small fields.
Keywords: Threshold cryptography, physical secret sharing, block designs, packings
DOI: 10.3233/JCS-210065
Journal: Journal of Computer Security, vol. 30, no. 5, pp. 655-688, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl