Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes



Similar documents
SECRET sharing schemes were introduced by Blakley [5]

Notes 11: List Decoding Folded Reed-Solomon Codes

Applied Algorithm Design Lecture 5

by the matrix A results in a vector which is a reflection of the given

Approximation Algorithms

Linear Authentication Codes: Bounds and Constructions

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property

Linear Codes. Chapter Basics

Ideal Class Group and Units

Secure Network Coding on a Wiretap Network

How To Prove The Dirichlet Unit Theorem

Chapter 6. Orthogonality

Fairness in Routing and Load Balancing

A New Generic Digital Signature Algorithm

Math 115A HW4 Solutions University of California, Los Angeles. 5 2i 6 + 4i. (5 2i)7i (6 + 4i)( 3 + i) = 35i + 14 ( 22 6i) = i.

Post-Quantum Cryptography #4

1 Message Authentication

Secure Network Coding via Filtered Secret Sharing

We shall turn our attention to solving linear systems of equations. Ax = b

Sphere Packings, Lattices, and Kissing Configurations in R n

The Ideal Class Group

How To Find An Optimal Search Protocol For An Oblivious Cell

Numerical Analysis Lecture Notes

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Offline sorting buffers on Line

Information Sciences

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Network Coding for Security and Error Correction

Applying General Access Structure to Metering Schemes

Factoring & Primality

Lecture 6 Online and streaming algorithms for clustering

Lecture 4 Online and streaming algorithms for clustering

Share conversion, pseudorandom secret-sharing and applications to secure distributed computing

Optimal File Sharing in Distributed Networks

2.1 Complexity Classes

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Private Approximation of Clustering and Vertex Cover

ON DEGREES IN THE HASSE DIAGRAM OF THE STRONG BRUHAT ORDER

On the representability of the bi-uniform matroid

References: Adi Shamir, How to Share a Secret, CACM, November 1979.

Network Security. Chapter 6 Random Number Generation. Prof. Dr.-Ing. Georg Carle

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Lattice Attacks in Cryptography: A Partial Overview

Efficient Recovery of Secrets

8. Linear least-squares

Two classes of ternary codes and their weight distributions

The van Hoeij Algorithm for Factoring Polynomials

Algorithm Design and Analysis

Network Security. Chapter 6 Random Number Generation

Similarity and Diagonalization. Similar Matrices

Co-Location-Resistant Clouds

How To Encrypt Data With A Power Of N On A K Disk

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

956 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009

3. INNER PRODUCT SPACES

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA

Key Agreement from Close Secrets over Unsecured Channels Winter 2010

Continued Fractions and the Euclidean Algorithm

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Chapter Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

Network coding for security and robustness

Linear Algebra Notes for Marsden and Tromba Vector Calculus

Permutation Betting Markets: Singleton Betting with Extra Information

Post-Quantum Cryptography #2

Mathematics Course 111: Algebra I Part IV: Vector Spaces

ON THE COMPLEXITY OF THE GAME OF SET.

Near Optimal Solutions

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

Follow the Perturbed Leader

Privacy-Preserving Aggregation of Time-Series Data

Short Programs for functions on Curves

Some applications of LLL

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

THE SCHEDULING OF MAINTENANCE SERVICE

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

Classification - Examples

Inner Product Spaces

Solving Linear Systems, Continued and The Inverse of a Matrix

Online Scheduling with Bounded Migration

FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 22

THE DIMENSION OF A VECTOR SPACE

Binary Image Reconstruction

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

A linear algebraic method for pricing temporary life annuities

An LLL Algorithm with Quadratic Complexity

PYTHAGOREAN TRIPLES KEITH CONRAD

1 Norms and Vector Spaces

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Transportation Polytopes: a Twenty year Update

Transcription:

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University) (email: hwang@ics.mq.edu.au) Josef Pieprzyk (Macquarie University) (email: josef@ics.mq.edu.au) 1

Overview (t,n)-threshold Secret Sharing Schemes Classical Shamir Scheme Changeable-Threshold Secret-Sharing Schemes Drawbacks of previous solutions Our Approach: Lattice-Based Threshold-Changeability for Classical Shamir Scheme Brief Review of Point Lattices Method for increasing the threshold from t to t > t Lattice-based Decoding Algorithm & Correctness Analysis Lattice-based Information-Theoretic Security Analysis 2

(t,n)-threshold Secret Sharing Fundamental cryptographic scheme (Shamir, 1979) Informal Definition: A Dealer owning a secret s wishes to distribute knowledge of s among a group of n shareholders such that two conditions hold: Correctness: Any subset of t shareholders can together recover s Security: Any subset of less than t shareholders cannot recover s Many applications in information security especially for achieving robustness of distributed security systems: Consider an access control system with n servers System is called t-robust if security is maintained even against attackers who succeed in breaking into up to t-1 servers Can be achieved by distributing the access control secret among the n servers using a (t,n)-threshold secret sharing scheme. 3

(t,n)-threshold Secret-Sharing Formal Definition (algorithms) 4

(t,n)-threshold Secret-Sharing Classical Shamir Scheme (Shamir 79) 5

Changeable-Threshold Secret-Sharing Motivation: In applications, choice of the threshold parameter t is a compromise between two conflicting factors: Value of Protected System & Attacker Resources Pushing the threshold as high as possible User Convenience and Cost Pushing the threshold as low as possible Hence actual value of t will be an equilibrium value, which will change in time as the relative strength of the above conflicting factors change in time This motivates study of Changeable-Threshold Secret-Sharing schemes 6

Changeable-Threshold Secret-Sharing Drawbacks of previous solutions are at least one of: Dealer Involvement after setup phase [eg. Blundo 93] Dealer broadcasts a message to all shareholders to allow them to update their shares from a (t,n) to a (t,n) scheme Implication: Dealer must communicate after setup! Initial (t,n)-threshold scheme is non-standard [eg. Martin 99] Simple example: Dealer gives each shareholder two shares of the secret, one for a (t,n) scheme, another for a (t,n) scheme Implication: Dealer must plan ahead! Shareholders privately communicate with each other [eg. Desmedt 97] E.g. Shareholders re-destribute secret among themselves for a (t,n) scheme via secure computation protocol Implication: Shareholders must communicate! Our scheme does not have any of these drawbacks! Although we only achieve relaxed correctness/security 7

secret Dealer... Changeable-Threshold Secret-Sharing n shares +... noise +... n subshares Basic idea of our approach Subset of t subshares... Lattice-Based Subshare Combiner secret To increase threshold from t to t > t, Each Shareholder adds a random `noise integer (of appropriate size) to his share, to obtain a subshare Subshares contain only partial information on original shares We expect that: Any t subshares are not sufficient to recover secret noise But t subshares (for some t > t depending on size of noise added) are sufficient to recover secret if we have an appropriate `error-correction algorithm (e.g if noise bit-length = ½ of share length, we expect that t ~ 2t subshares uniquely determine the secret) The new `subshare combiner algorithm is the error correction algorithm We construct this algorithm using lattice basis reduction! 8

Point Lattices (Brief Intro) Definition (Lattice): Given a basis of linearly-independent vectors in vector space, we call the set of all integer linear combinations of these vectors a lattice of dimension A basis matrix of lattice is an matrix listing basis vectors in rows The determinant of lattice is where is any basis matrix for. Geometrically, is equal to the volume of any fundamental parallelpiped (f.p.) of. We use infinity-norm (max. abs. value of coordinates) to measure length of lattice vectors Define Minkowski Minima of lattice : = shortest infinity-norm over all non-zero vectors of = shortest infinity-norm bound over all linearlyindependent vectors of 9

Point Lattices (Brief Intro) 10

Point Lattices (Brief Intro) The Closest Vector Problem (CVP) Exact (and near-exact) version of CVP is hard to solve efficiently in theory (NP-hard) But efficient Approximate-CVP algorithms exist First polynomial-time algorithm [Babai 86] suffices for us: 11

Threshold-Changeability for Classical Shamir Scheme - Algorithms Increasing the threshold from t to t > t 12

Threshold-Changeability for Classical Shamir Scheme - Algorithms Noisy subshares decoding algorithm (subshare combiner) 13

Threshold-Changeability for Classical Shamir Scheme - Correctness Decoding algorithm correctness analysis (Main ideas): By construction, the dealer s secret polynomial gives rise to a lattice vector which is close to the target vector That is,, so the approx. close lattice vector returned by satisfies. By triangle inequality, the error lattice vector is short : and our algorithm fails only if this error lattice vector is bad in the sense: We use counting argument to upper bound number of public vectors for which contains short and bad vectors 14

Threshold-Changeability for Classical Shamir Scheme - Correctness Algorithm correctness analysis (continued) Counting argument to upper bound number of public vectors for which contains short and bad vectors reduces to following algebraic counting lemma: We use this to obtain an upper bound on fraction of bad public vectors for which combiner may not always work This bad fraction can be made as small as we wish, for sufficiently large security parameter 15

Threshold-Changeability for Classical Shamir Scheme - Security Security Analysis (Main Ideas): We assume a uniform distribution on secret space : Secret entropy We show that, for all choices of the public vector except for a small bad fraction, the following holds: For all subshare subsets of size with and all values for the corresponding subshare vector, the conditional probability distribution for the secret given the observed subshare vector value, is close to uniform: Secret entropy loss is bounded as (for all I and ) 16

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) To derive bound we observe where for integers and we define We lower bound (no. of dealer poly consistent with shares) We upper bound (no. of dealer poly consistent with shares and any fixed value for the secret) 17

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) We first reduce the problem to lattice point counting: 18

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) Now we use lattice tools to lower bound Note is a non-homogenous counting problem: we need the number of lattice points in a box centred on a (non-lattice) vector We reduce this non-homogenous problem to two simpler problems: The homogenous problem of lower bounding the number of lattice points in an origin-centred box Upper bounding the largest Minkowski minimum 19

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) Proof idea of reduction of non-homogenous lower bound to homogenous lower bound + upper bound on 20

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) Problem 1 (point counting in origin-symmetric box) is solved directly by applying Blichfeldt-Corput Theorem: Problem 2 (upper bounding ) is solved by applying Minkowski s Second Theorem to reduce it first to the problem of lower bounding the first Minkowski minimum(shortest vector norm) We lower bound the first Minkowski minimum (except for a small fraction of bad public vectors ) by applying our algebraic counting lemma (using similar argument used in correctness analysis) 21

Threshold-Changeability for Classical Shamir Scheme - Security Security analysis (cont.) This completes the results needed to lower bound Recall that we also need to upper bound We reduce this problem also to lower bounding with the following result: And now we use our lower bound on again! 22

Conclusions Presented lattice-based threshold changeability algorithms for Shamir secret-sharing Proved concrete bounds on correctness and security using classical results from theory of lattices 23