Template modeling score

From formulasearchengine
Revision as of 05:16, 3 September 2013 by en>Michael Hardy (context)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Secret sharing consists of recovering a secret S from a set of shares, each containing partial information about the secret. The Chinese remainder theorem (CRT) states that for a given system of simultaneous congruence equations, the solution is unique in some /n, with n>0 under some appropriate conditions on the congruences. Secret sharing can thus use the CRT to produce the shares presented in the congruence equations and the secret could be recovered by solving the system of congruences to get the unique solution, which will be the secret to recover.

Secret sharing schemes: several types

Mining Engineer (Excluding Oil ) Truman from Alma, loves to spend time knotting, largest property developers in singapore developers in singapore and stamp collecting. Recently had a family visit to Urnes Stave Church. There are several types of secret sharing schemes. The most basic types are the so-called threshold schemes, where only the cardinality of the set of shares matters. In other words, given a secret S, and n shares, any set of t shares is a set with the smallest cardinality from which the secret can be recovered, in the sense that any set of t-1 shares is not enough to give S. This is known as a threshold access structure. We call such schemes (t,n) threshold secret sharing schemes, or t-out-of-n scheme.

Threshold secret sharing schemes differ from one another by the method of generating the shares, starting from a certain secret. The first ones are Shamir's threshold secret sharing scheme, which is based on polynomial interpolation in order to find S from a given set of shares, and George Blakley's geometric secret sharing scheme, which uses geometric methods to recover the secret S. Threshold secret sharing schemes based on the CRT are due to Mignotte and Asmuth-Bloom, they use special sequences of integers along with the CRT.

Chinese remainder theorem

Mining Engineer (Excluding Oil ) Truman from Alma, loves to spend time knotting, largest property developers in singapore developers in singapore and stamp collecting. Recently had a family visit to Urnes Stave Church. Let k2, m1,...,mk2, and b1,...,bk. The system of congruences

{xb1modm1...xbkmodmk

has solutions in if and only if bibjmod(mi,mj) for all 1i,jk, where (mi,mj) denotes the greatest common divisor (GCD) of mi and mj. Furthermore, under these conditions, the system has a unique solution in /n where n=[m1,...,mk], which denotes the least common multiple (LCM) of m1,...,mk.

Secret sharing using the CRT

Since the Chinese remainder theorem provides us with a method to uniquely determine a number S modulo k-many relatively prime integers m1,m2,...,mk, given that S<i=1kmi, then, the idea is to construct a scheme that will determine the secret S given any k shares (in this case, the remainder of S modulo each of the numbers mi), but will not reveal the secret given less than k of such shares.

Ultimately, we choose n relatively prime integers m1<m2<...<mn such that S is smaller than the product of any choice of k of these integers, but at the same time is greater than any choice of k-1 of them. Then the shares s1,s2,...,sn are defined by si=Smodmi for i=1,2,...,n. In this manner, thanks to the CRT, we can uniquely determine S from any set of k or more shares, but not from less than k. This provides the so-called threshold access structure.

This condition on S can also be regarded as i=nk+2nmi<S<i=1kmi. Since S is smaller than the smallest product of k of the integers, it will be smaller than the product of any k of them. Also, being greater than the product of the greatest k-1 integers, it will be greater than the product of any k-1 of them.

There are two Secret Sharing Schemes that utilize essentially this idea, Mignotte's and Asmuth-Bloom's Schemes, which are explained below.

Mignotte's threshold secret sharing scheme

As said before, Mignotte's threshold secret sharing scheme uses, along with the CRT, special sequences of integers called the (k,n)-Mignotte sequences which consist of n integers, pairwise coprime, such that the product of the smallest k of them is greater than the product of the k - 1 biggest ones. This condition is crucial because the scheme is built on choosing the secret as an integer between the two products, and this condition ensures that at least k shares are needed to fully recover the secret, no matter how they are chosen.

Formally, let n2 be an integer, and k be an integer such that 2kn. A (k,n)-Mignotte sequence is a strictly increasing sequence of positive integers m1<<mn, with (mi,mj)=1 for all 1i<jn, such that mnk+2mn<m1mk. We call this range the authorized range. We build a (k,n)-threshold secret sharing scheme as follows: We choose the secret S as a random integer in the authorized range. We compute, for every 1in, the reduction modulo mi of S that we call si, these are the shares. Now, for any k different shares si1,,sik, we consider the system of congruences: {xsi1modmi1xsikmodmik

By the Chinese remainder theorem, since mi1,,mik are pairwise coprime, the system has a unique solution modulo mi1mik. By the construction of our shares, this solution is nothing but the secret S to recover.

Asmuth-Bloom's threshold secret sharing scheme

This scheme also uses special sequences of integers. Let n2 be an integer, and k be an integer such that 2kn. We consider a sequence of pairwise coprime positive integers m0<...<mn such that m0.mnk+2...mn<m1...mk. For this given sequence, we choose the secret S as a random integer in the set /m0.

We then pick a random integer α such that S+α.m0<m1...mk. We compute the reduction modulo mi of S+α.m0, for all 1in, these are the shares Ii=(si,mi). Now, for any k different shares Ii1,...,Iik, we consider the system of congruences:

{xsi1modmi1...xsikmodmik

By the Chinese remainder theorem, since mi1,...,mik are pairwise coprime, the system has a unique solution S0 modulo mi1...mik. By the construction of our shares, the secret S is the reduction modulo m0 of S0

It is important to notice that the Mignotte (k,n)-threshold secret-sharing scheme is not perfect in the sense that a set of less than k shares contains some information about the secret. The Asmuth-Bloom scheme is perfect: α is independent of the secret S and

i=nk+2nmiα}<i=1kmim0.

Therefore α can be any integer modulo i=nk+2nmi. This product of (k-1) moduli is the largest of any of the n choose (k-1) possible products, therefore any subset of (k-1) equivalences can be any integer modulo its product, and no information from S is leaked.

Example

The following is an example on the Asmuth-Bloom's Scheme. For practical purposes we choose small values for all parameters. We choose k=3 and n=4. Our pairwise coprime integers being m0=3, m1=11, m2=13, m3=17 and m4=19. They satisfy the Asmuth-Bloom required sequence because 31719<111317.

Say our secret S is 2. Pick α=51, satisfying the required condition for the Asmuth-Bloom scheme. Then 2+513=155 and we compute the shares for each of the integers 11, 13, 17 and 19. They are respectively 1, 12, 2 and 3. We consider one possible set of 3 shares: among the 4 possible sets of 3 shares we take the set {1,12,2} and show that it recovers the secret S=2. Consider the following system of congruences:

{x1mod11x12mod13x2mod17

To solve the system, let M=111317. From a constructive algorithm for solving such a system, we know that a solution to the system is x0=1e1+12e2+2e3, where each ei is found as follows:

By Bézout's identity, since (mi,M/mi)=1, there exist positive integers ri and si, that can be found using the Extended Euclidean algorithm, such that ri.mi+si.M/mi=1. Set ei=siMi/mi.

From the identities 1=12212011=(5)187+7213=5143+(42)17, we get that e1=221,e2=935,e3=715, and the unique solution modulo 111317 is 155. Finally, S=1552mod3.

See also

References

  • Oded Goldreich, Dana Ron and Madhu Sudan, Chinese Remaindering with Errors, IEEE Transactions on Information Theory, Vol. 46, No. 4, July 2000, pages 1330-1338.
  • C.A. Asmuth and J. Bloom. A modular approach to key safeguarding. IEEE Transactions on Information Theory, IT-29(2):208-210, 1983.
  • Sorin Iftene. General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting. Electronic Notes in Theoretical Computer Science (ENTCS). Volume 186, (July 2007). Pages 67–84. Year of Publication: 2007. ISSN:1571-0661.
  • Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, 2001. ISBN 0-262-03293-7. Section 31.5: The Chinese remainder theorem, pages 873-876.
  • Ronald Cramer. Basic Secret Sharing (Lectures 1-2), Class Notes. October 2008, version 1.1.

External links

ru:Схема Миньотта