This application claims the priority of Korean Patent Application No. 10-2023-0046386 filed on Apr. 7, 2023 in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference.
The disclosure relates to a share hardening method for multi-factor threshold secret sharing, and more particularly, to a threshold secret sharing method which includes an arbitrary share predetermined by a user, and is capable of guaranteeing a security.
(t, n) threshold secret sharing (TSS) refers to a method which may generate n shares from a secret S, and then reconstruct the secret S using any t shares among n shares.
Representative threshold secret sharing methods include Shamir's secret sharing methods using a polynomial and Blakely's secret sharing method using geometric properties. For example, in the Shamir's secret sharing method using a polynomial, a constant term of a polynomial is set as the secret S, and n points through which the polynomial passes are chosen as the share, and then the polynomial is restored by any t points to find the secret S. When the secret sharing methods are used, shares are kept at distributed places, so a secrecy of the secret S is increased and a risk of losing the secret is also lowered.
However, since the secret sharing methods derive the share from a polynomial or a plane which is randomly generated, the secret sharing methods generate a complex and long type share.
For example, the share generated from the polynomial or plane is not memorizable and is difficult to manage, and as a result, a computer system or a separate digital device is required to keep and manage the share.
When a password which is memorizable or biometric information such as fingerprint may be used, a separate computer or digital device is not required, and the usability of secret sharing may be improved.
For example, when a conventional method is slightly modified, it is possible to use a predetermined value as a share like the password or the biometric information. However, using information such as the password or biometric information as the share may be difficult to ensure security. When the predetermined value is not random or its entropy is low, an adversary may deduce a secret S only by (t−1) shares through guessing the predetermined value or a brute force attack.
According to the various exemplary embodiments of the present disclosure, a share hardening method for multi-factor threshold secret sharing may guarantee security and safety of secret sharing while using a value predetermined by a user as a share like a password or biometric information.
According to various exemplary embodiments of the present disclosure, in a share hardening method for multi-factor threshold secret sharing, an object is to provide a share hardening method that allows to use knowledge of a user such as a password and/or inherence of the user such as biometric information as the share. When the provided method is used, multi-factor secret sharing capable of reconstructing the secret using various elements will be possible.
According to various exemplary embodiments, a share hardening method for multi-factor threshold secret sharing may include: an operation of accepting at least one predetermined first share value; an operation of randomly generating at least one second share value corresponding to the at least one predetermined first share value; an operation of determining an aggregate share using the at least one predetermined first share value and the at least one second share value; an operation of generating a polynomial for threshold secret sharing based on the determined aggregate share; and an operation of generating the remaining full shares based on the generated polynomial.
According to various exemplary embodiments, a share hardening method for multi-factor threshold secret sharing may include: an operation of generating an arbitrary polynomial for threshold secret sharing; an operation of accepting at least one predetermined first share value; an operation of generating m−1 second share values by a random method; an operation of determining an aggregate share using the at least one predetermined first share value and the generated m−1 second share values, and acquiring a last second share value; and an operation of generating the remaining full shares based on the generated polynomial.
According to various exemplary embodiments, a share hardening method for multi-factor threshold secret sharing may include: an operation of generating full shares using an arbitrary secret sharing method; an operation of determining one share of the full shares as an aggregate share; an operation of accepting at least one predetermined first share value; an operation of generating a polynomial for the threshold secret sharing based on the aggregate share and the at least one first share value; and an operation of generating at least one second share value corresponding to the at least one first share value based on the generated polynomial.
According to various exemplary embodiments of the present disclosure, a share hardening method for multi-factor threshold secret sharing may improve a security by further using a password and/or biometric information having low risk of electronic hacking or replication in a threshold secret sharing method.
According to various exemplary embodiments of the present disclosure, a share hardening method for multi-factor threshold secret sharing may improve the usability of secret sharing by using a password and/or biometric information that does not require a separate computer or digital device for storage and provides excellent accessibility.
The above and other aspects, features and other advantages of the present disclosure will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
The present disclosure may have various modifications and various exemplary embodiments and specific exemplary embodiments will be illustrated in the drawings and described in detail. However, this does not limit the present disclosure to specific exemplary embodiments, and it should be understood that the present disclosure covers all the modifications, equivalents and replacements included within the idea and technical scope of the present disclosure. In describing each drawing, reference numerals refer to like elements.
Terms including as first, second, A, B, and the like are used for describing various constituent elements, but the constituent elements are not limited by the terms. The terms are used only to discriminate one constituent element from another component. The terms are used only to discriminate one constituent element from another component. A term ‘and/or’ includes a combination of a plurality of associated disclosed items or any item of the plurality of associated disclosed items.
It should be understood that, when it is described that a component is “connected to” or “accesses” another component, the component may be directly connected to or access the other component or a third component may be present therebetween. In contrast, when it is described that a component is “directly connected to” or “directly accesses” another component, it is understood that no element is present between the element and another element.
Terms used in the present application are used only to describe specific embodiments, and are not intended to limit the present disclosure. A singular form may include a plural form if there is no clearly opposite meaning in the context. Further, in the present application, it should be understood that the term “include” or “have” indicates that a feature, a number, a step, an operation, a component, a part or the combination thereof described in the specification is present, but does not exclude a possibility of presence or addition of one or more other features, numbers, steps, operations, components, parts or combinations thereof, in advance.
If it is not contrarily defined, all terms used herein including technological or scientific terms have the same meanings as those generally understood by a person with ordinary skill in the art. Terms which are defined in a generally used dictionary should be interpreted to have the same meaning as the meaning in the context of the related art, and are not interpreted as an ideal meaning or excessively formal meanings unless clearly defined in the present application.
Hereinafter, a preferred embodiment of the present disclosure will be described in detail with reference to the accompanying drawings.
Referring to
According to various exemplary embodiments, a plurality of user terminals 110, 120, and 130 may be a fixed electronic device or a mobile electronic device implemented by a computer device. The plurality of user terminal devices 110, 120, and 130 may include, for example, a smart phone, a portable phone, a navigation, a computer, a laptop, a digital broadcasting terminal, personal digital assistants (PDA), a portable multimedia player (PMP), and a tablet PC.
As an example, in
A device for implementing the share hardening method for multi-factor threshold secret sharing according to the exemplary embodiment of the present disclosure may be one of the plurality of user terminal devices 110, 120, and 130. For example, the first electronic device 110 may generate a share for threshold secret sharing, and the second electronic device 120 and the third electronic device 130 may participate in the threshold secret sharing, and may be shared with the share from the first electronic device 110.
A communication scheme of the network 150 is not limited, and may include a communication scheme utilizing a communication network (e.g., a mobile communication network, a wired internet, a wireless internet, and a broadcasting network) which may include the network 150, and also include short-range wireless communication. For example, the network 150 may include one or more arbitrary networks among networks such as a personal area network (PAN), a local area network (LAN), a campus area network (CAN), a metropolitan area network (MAN), a wide area network (WAN), and a broadband network (BBN).
Referring to
The storage unit 210 as a computer-readable recording medium may include a permanent mass storage device such as a random access memory (RAM), a read only memory (ROM), and a disk drive. Here, the permanent mass storage device such as the ROM and the disk device as a separate permanent storage device distinguished from the storage unit 210 may also be included in the electronic device 200.
Further, the storage unit 210 may store an operating system and at least one program code. The software components may be loaded to the storage unit 210 from a separate computer-readable recording medium apart from the storage unit 210. The separate computer-readable recording medium may include computer-readable recording media such as a floppy drive, a disk, a tape, a DVD/CD-ROM drive, and a memory card. In another exemplary embodiment, the software components may also be loaded to the storage unit 210 through the communication unit 230 rather than the computer-readable recording medium. For example, the software components may be loaded to the storage unit 210 of the electronic device 200 based on a computer program installed by files received through the network 150.
According to various exemplary embodiments, the storage unit 210 may store a password designated by a user or biometric information.
The processor 220 as a component that controls an overall operation of the electronic device 200 may be configured to perform basic arithmetic, logic, and input/output operations to process an instruction of the computer program. The instruction may be provided to the processor 220 by the storage unit 210 or the communication unit 230. For example, the processor 220 may be configured to execute an instruction received according to a program code stored in the recording device such as the storage unit 210.
The processor 220 may be configured, for example, to accept at least one predetermined first share value, randomly generate at least one second share value corresponding to the at least one predetermined first share value, determine an aggregate share using the at least one predetermined first share value and the at least one second share value, generate a polynomial for threshold secret sharing based on the determined aggregate share, and generate the remaining full share based on the generated polynomial.
The processor 220 may be configured, for example, to generate an arbitrary polynomial for threshold secret sharing, accept at least one predetermined first share value, generate m−1 second share values (hardening shares) by a random method, determine an aggregate share using at least one of the predetermined first share value and the generated m−1 second share values, acquire a last second share value, and generate the remaining full shares based on the generated polynomials.
The processor 220 may be configured, for example, to generate the full shares using an arbitrary secret sharing method, determine one share of the full shares as the aggregate share, accept at least one predetermined first share value, generate a polynomial for threshold secret sharing based on the aggregate share and the at least one first share value, and generate at least one second share value corresponding to the at least one first share value based on the generated polynomial.
The communication unit 230 may provide a function for mutual communication with other devices (e.g., the above-described storage devices) through the network 150. As an example, the processor 220 of the electronic device 200 may deliver a request or an instruction, data, or a file generated according to the program code stored in the recording device such as the storage unit 210 to other devices through the network 150 according to the control of the communication unit 230.
On the other hand, the electronic device 200 may receive signals, instructions, data, and files from other devices through the communication unit 230 via the network 150. The signal, the instruction, and the data received through the communication unit 230 may be delivered to the processor 220 or the storage unit 210, and the file may be stored in a storage medium (the above described permanent storage device) which may be further included in the electronic device 200.
The input/output interface 240 may be a means for interfacing with the input/output device
260. For example, the input device may include a microphone, a keyboard, or a mouse, and the output device may include devices such as a display and a speaker. As another example, the input/output interface 240 may also be a means for interfacing with a device in which functions for an input and an output are integrated into one, such as a touch screen.
The sensor module 250 may sense an operation state (e.g., power or temperature) of the electronic device 200, or an external environmental state (e.g., user state), and generate an electric signal or a data value corresponding to the sensed state. According to an exemplary embodiment, the sensor module 250 may include, for example a gesture sensor, a gyro sensor, an atmospheric pressure sensor, a magnetic sensor, an acceleration sensor, a grip sensor, a proximity sensor, a color sensor, an infrared (IR) sensor, a biometric sensor, a temperature sensor, a humidity sensor, or an illuminance sensor.
Further, in another exemplary embodiments, the electronic device 200 may include more components or less components than the components of
hardening method for multi-factor threshold secret sharing according to various exemplary embodiments of the present disclosure.
Referring to
A first share (or referred to as ‘predetermined share’) means, for example, a share predetermined by the user, such as the password or biometric information. Since conventional secret sharing methods first determine a polynomial or a geometric object, and then derives the share therefrom, the conventional secret sharing methods generate a complex and long type share. The generated share is not memorizable and is difficult to manage, and there is a problem in that a computer system or a separate digital device should be used to keep and manage the share. However, when a password which is memorizable or biometric information such as fingerprint may be used as the share, a separate device for keeping the share is not required, and the usability of secret sharing may be significantly improved due to excellent accessibility.
In operation 320, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, one or more second shares (or referred to as ‘hardening share’) having randomness and sufficient entropy may bind to a preselected first share (or ‘predetermined share’).
According to various exemplary embodiments, the electronic device may determine m hardening shares h1, h2, . . . , hm binding to a predetermined share p. In order to distinguish the full share generated by the conventional secret sharing method, a first share (predetermined share) and a second share (hardening share) may be referred to as partial shares.
In the present disclosure, there is no limit in the number of predetermined shares (first shares), but in the present disclosure, for convenience of description, only a case where m hardening shares (second shares) are binding to one predetermined share is described as an example. The share hardening method for multi-factor threshold secret sharing according to various exemplary embodiments of the present disclosure may extend the predetermined share (first share) to a plurality of shares, and the number of predetermined shares is not limited to one. Secret sharing using m hardening shares with one predetermined share is expressed as (t, (m), n) secret sharing. If one predetermined share is used, but no hardening share is used, this may be expressed as (t, (0), n) secret sharing, and this is distinguished from conventional (t, n) secret sharing which does not use a predetermined share.
In operation 330, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, when the share generated by the conventional threshold secret sharing method is referred to as the full share, information which may be acquired by aggregating all the predetermined share p and m hardening shares is referred to as the aggregate share. Compared with the full share generated by the conventional method, the aggregate share is defined and generated in a different manner, but the aggregate share and the full share may be used equally when the secret is reconstructed. When the total number of aggregate shares and the full shares becomes t, it becomes possible to reconstruct the secret.
According to various exemplary embodiments of the present disclosure, the (t, (m), n) secret sharing method may use a partial share which satisfies following two properties.
Property 2 is related to perfect secrecy for the secret S. In general, when no information related to the secret S may be deduced by shares of a number less than t, a (t, n) threshold secret sharing system is said to have perfect security. When the hardening share satisfying property 2 is applied to the conventional (t, n) secret sharing method providing the perfect security, no information on the secret S may be found by (t−1) full shares and (m−1) hardening shares. When property 2 is satisfied, (m−1) hardening shares do not help finding the aggregate share, and as a result, information which may be used to find the secret is just (t−1) full shares. When the conventional (t, n) secret sharing method to which the present disclosure is to be applied provides the perfect security, no information on the secret S may be found by (t−1) full shares and (m−1) hardening shares.
In operation 340, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 350, the electronic device (e.g., the electronic devices 110, 120, and 130 of
Referring to
Referring to
For example, a point R(p, h) at which the x-axis coordinate value is a first predetermined share p and the y-axis coordinate value is a hardening share h may be selected. For example, referring to
In operation 420, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device may generate the polynomial of degree (t−1)f(x)=at−1xt−1+at−2xt−2+ . . . +S by randomly generating the remaining coefficients other than ai while setting one coefficient ai as the variable.
In operation 430, the electronic device (e.g., the electronic devices 110, 120, and 130 of
Referring to
In operation 510, the electronic device (e.g., the electronic devices 110, 120, and 130 of
According to various exemplary embodiments, the electronic device may determine the point R using an entropy preserving function g( ) in order to satisfy property 2. When a coordinate value of the point R is determined by applying the function g( ) to the partial shares p, h1, h2, . . . , hm, the point R corresponding to the aggregate share may not be found if even any one of the hardening shares h1, h2, . . . , hm is not known. The reason is that h1, h2, . . . , hm are randomly generated, and g( ) preserves the entropy.
According to various exemplary embodiments, the entropy preserving g( ) may include an encryption algorithm, a one way function, a pseudo random number generator, and a pseudo random function. For example, XOR encryption may be used, and when an XOR operator is represented by ⊕, g(p, h1, h2, . . . , hm−1)=p⊕h1⊕h2⊕ . . . ⊕hm−1 may be established.
According to various exemplary embodiments, a method for selecting the point R uses one partial share as the x-axis or y-axis coordinate value of the point R, and uses the entropy preserving function g( ) for the remaining partial shares as the remaining coordinate value of the point R. In this case, a form of the aggregate share may become (p, g(h1, h2, . . . , hm)), (hi, g(h1, h2, . . . , p, . . . , hm)), (g(h1, h2, . . . , hm), p), (g(h1, h2, . . . , p, . . . , hm), hi), etc.
A method for selecting the point R according to yet another exemplary embodiments is to apply the entropy preserving functions g1( ) and g2( ) to the x-axis coordinate value and the y-axis coordinate value, respectively. In this case, the form of the aggregate share may become (g1(p, h1, h2, . . . ), g2(hi, . . . , hm)). In this case, each partial share should be used at least once. For example, referring to
In operation 520, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 530, the electronic device (e.g., the electronic devices 110, 120, and 130 of
Referring to
In operation 610, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 620, the electronic device (e.g., the electronic devices 110, 120, and 130 of
According to various exemplary embodiments, the entropy preserving function g( ) may include the encryption algorithm, the one way function, the pseudo random generator, and the pseudo random function. For example, XOR encryption may be used, and when an XOR operator is represented by ⊕, g(p, h1, h2, . . . , hm−1)=p⊕h1⊕h2⊕ . . . ⊕hm−1 may be established.
In operation 630, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 640, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In the unconstrained coefficient generation technique, the aggregate share has the form of the coefficient, but still satisfies property 1. In general, a polynomial of degree (t−1) or a (t−1)-dimensional plane f( ) may be determined by either t distinct points or t coefficients. Further, the polynomial f( ) of degree (t−1) or (t−1)-dimensional plane f( ) may also be uniquely determined by (t−1) points and one coefficient. That is, the point and the coefficient may regard to be equivalent from the viewpoint of reconstructing the secret. Since the coefficient ai determined by g(p, h1, h2, . . . , hm) may be used equivalently to one full share, property 1 is satisfied. Further, since the coefficient is determined using the entropy preserving function g( ) property 2 is also satisfied.
Referring back to
Although not illustrated, the electronic device distributes the generated full shares to participants of a number corresponding to the number of full shares to share the secret.
An exemplary embodiment in which the present disclosure is applied to Shamir secret sharing on a finite field Fq will be described. For convenience of calculation, 13 which is a prime number is assumed as a value of q. As a result, the secret S, the coefficient, the coordinate value, and the shares used in the secret sharing are all defined in F13.
It is assumed that the secret value is determined as S=3 and the predetermined share is determined as p=5, and m hardening shares are generated.
Since the multiplicative inverse of 25 is 12 in F13,
Therefore, the quadratic polynomial may become f(x)=x2+9x+3.
The generated quadratic polynomial may be used for generating the full share by the same method as the conventional method. When there is a total of 5 shares which are to be generated by assuming n=5, three remaining full shares may be generated except for one predetermined share and one hardening share which are already determined. When the above determined polynomial f(x)=x2+9x+3 is used, three full shares (1, 0), (2, 12), and (3, 0) may be obtained. This case is expressed as (3, (1), 5) secret sharing.
Therefore, the coordinates of the point R become (5, 12). When it is assumed that the total number of the aggregate shares and the full shares required for reconstructing the secret is 3, that is t=3, the quadratic polynomial f(x)=a2x2+a1x+a0=a2x2+9x+3 may be generated by randomly generating the remaining coefficients other than one coefficient a2. The coefficient a2 may be determined so that the polynomial f(x) passes through the point R (5, 12).
Since the multiplicative inverse of 25 is 12 in F13,
Therefore, the quadratic polynomial may become f(x)=10x2+9x+3.
The generated quadratic polynomial may be used for generating the full share by the same method as the conventional method. When there is a total of 6 shares which are to be generated by assuming n=6, two remaining full shares may be generated except for one predetermined share and three hardening shares which are already determined. When the above determined polynomial f(x)=32 10x2+9x+3 is used, two full shares (1, 9) and (2, 9) may be obtained. This case is expressed as (3, (3), 6) secret sharing.
An exemplary embodiment in which the present disclosure is applied to Shamir secret sharing on a finite field Fq will be described. For convenience of calculation, 13 which is a prime number is assumed as a value of q. As a result, the secret S, the coefficient, the coordinate value, and the shares used in the secret sharing are all defined in F13.
It is assumed that the secret value is determined as S=3 and the predetermined share is determined as p=5, and m hardening shares are generated.
When m=3, three hardening shares h1, h2, and h3 may be first randomly generated. For example, it is assumed that the acquired values are h1=6 (=0110), h2=8 (=1000), and h3=2 (=0010), respectively. Using the XOR encryption, the value of one coefficient a2 may be determined as p⊕h1⊕h2⊕h.
When it is assumed that the total number of the aggregate shares and the full shares required for reconstructing the secret is 3, that is t=3, the quadratic polynomial f(x)=a2x2+a1x+a0=11x2+9x+3 or a 2D plane f(x1, x2)=11x1+9x2+3 may be generated by randomly generating the remaining coefficients other than one coefficient a2.
The generated quadratic polynomial or 2D plane may be used for generating the full share by the same method as the conventional method. When there is a total of 6 shares which are to be generated by assuming n=6, two remaining full shares may be generated except for one predetermined share and three hardening shares which are already determined. When the above determined polynomial 11x2+9x+3 is used, two full shares (1, 10) and (2, 0) may be obtained. This case is expressed as (3, (3), 6) secret sharing.
Referring to
In operation 720, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 730, when the plurality of hardening shares is intended to be used, m−1 second share (hardening share) values having sufficient entropy may be randomly generated. For example, when m hardening shares h1, h2, . . . , hm binding to the predetermined share p are intended to be generated, the electronic device may pre-generate m−1 values corresponding to the hardening shares h1, h2, . . . , hm−1.
When a single second share (hardening share) is generated, operation 730 may be omitted.
In operation 740, the electronic device (e.g., the electronic devices 110, 120, and 130 of
As another example, when the single second share (hardening share) is generated, the y-axis coordinate value of a point having the first share value as the x-axis coordinate among the points of the generated polynomial f(x) may be determined as the second share (hardening share) value.
When the share generated by the conventional threshold secret sharing method is called the full share, information which may be acquired by aggregating all of the predetermined share p and m hardening shares is referred to as the aggregate share, which is distinguished from the full share.
In operation 750, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device may generate n−m−1 remaining full shares based on the generated polynomial.
Although not illustrated, the electronic device distributes the generated full shares to participants of a number corresponding to the number of full shares to share the secret.
Referring to
For example, the electronic device may generate a polynomial of degree (t−1)f(x)=at−1xt−1+at−2xt−2+ . . . +, S which has the random coefficient ai.
In operation 820, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device may select a point R at which the x-axis coordinate value is p among the points through which the polynomial f(x) passes. That is, the electronic device may select a point R(p, f(p)) using a y-axis coordinate value corresponding to f(p). For example, referring to
In operation 830, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, h=f(p), and the aggregate share may become the point R(p, h). Referring back to
devices 110, 120, and 130 of
Although not illustrated, the electronic device distributes the generated full shares to participants of a number corresponding to the number of full shares to share the secret.
Referring to
For example, the electronic device may generate a polynomial f(x)=at−1xt−1+at−2xt−2+ . . . +S which has the random coefficient ai.
In operation 920, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device may randomly generate (m−1) hardening shares h1, h2, . . . hm−1. According to an exemplary embodiment, the electronic device may generate one or more hardening shares having randomness and sufficient entropy.
In operation 930, the electronic device (e.g., the electronic devices 110, 120, and 130 of
According to various exemplary embodiments, the entropy preserving function g( ) may include an encryption algorithm, a one way function, a pseudo random generator, and a pseudo random function. For example, the XOR encryption may be used, and when the XOR operator is represented by ⊕, g(p, h1, h2, . . . , hm−1)=p⊕h1⊕h2⊕ . . . . ⊕hm−1 may be established.
In operation 940, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, hm =f(g(p, h1, h2, . . . , hm−1)), and the aggregate share may become R(g(p, h1, h2, . . . , hm−1), hm).
Referring back to
Although not illustrated, the electronic device distributes the generated full shares to participants of a number corresponding to the number of full shares to the share the secret.
An exemplary embodiment in which the present disclosure is applied to Shamir secret sharing on a finite field Fq will be described. For convenience of calculation, 13 which is a prime number is assumed as a value of q. As a result, the secret S, the coefficient ai, the coordinate value, and the shares used in the secret sharing are all defined in F13.
It is assumed that the secret value is determined as S=3 and the predetermined share is determined as p=5, and m hardening shares are generated.
When it is assumed that the randomly generated quadratic polynomial is f(x)=x2+9x+3 and three full shares V1=0, V2=12, and V3=0 may be acquired from three points (1, f(1)), (2, f(2)), and (3, f(3)) through which the f(x) passes.
Since the y-axis coordinate of the point R (p⊕h1⊕h2, f(p⊕h1⊕h2)) is chosen as the last hardening share h3, h3 may be calculated as follows.
Referring to
For example, the electronic device may generate (n−m−1) full shares V1, V2, . . . , Vn−m−1 of a first level based on a complete first polynomial f1(x) using an arbitrary secret sharing method TSS1. According to various exemplary embodiments of the present disclosure, a hierarchical share generation method may use the Blakely method using the geometric object or other conventional secret sharing methods in the first level, and does not limit the secret sharing method which may be used in the first level.
In operation 1003, the electronic device (e.g., the electronic devices 110, 120, and 130 of
Referring to
In operation 1005, the electronic device (e.g., the electronic devices 110, 120, and 130 of
In operation 1007, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device may generate a complete polynomial f2(x) defining a second level. For example, the electronic device may determine a point R (k, p) having an arbitrary value k as the x-axis coordinate value and the first share (predetermined share) p as the y-axis coordinate value. Thereafter, the electronic device may generate a polynomial of degree m f2(x)=amxm+am−1xm−1+ . . . , Vj by randomly generating the remaining coefficients other than one coefficient ai, and then determine the coefficient ai so that f2(x) passes through the point R.
In operation 1009, the electronic device (e.g., the electronic devices 110, 120, and 130 of
For example, the electronic device selects m different points other than R among the points of the polynomial f2(x) to generate each y-axis coordinate value of each point as the second share (hardening share).
Referring to
The hierarchical share generation technique may generate the partial share which satisfies property 2 when a perfectly secure polynomial-based secret sharing method is used in the second level. In that case, the aggregate share may not be found by (m−1) hardening shares.
An exemplary embodiment in which the present disclosure is applied to Shamir secret sharing on a finite field Fq will be described. For convenience of calculation, a prime number 13 is assumed as a value of q. As a result, the secret S, the coefficient ai, the coordinate value, and the share used in the secret sharing are all defined in F13.
It is assumed that the secret value is determined as S=3 and the predetermined share is determined as p=5, and two hardening shares for (3, (2), 4) secret sharing are generated.
In the first level, the quadratic polynomial f1(x)=x2+9x+3 is determined using the Shamir method, and then two shares V1=0 and V2=12 may be generated from two points (1, f1(1)) and (2, f1(2)). V2 is selected among the generated shares and determined as the aggregate share.
In the second level, V2=12 is set as the secret, and the predetermined share p=5 is used to determine the coordinate of the point R as (3, 5). The quadratic polynomial f2(x)=a2x2+a1x+a0=x2+12x+12 which passes through the point R may be generated with a randomly generated coefficient a1. Two hardening shares h1=12 and h2=1 may be generated from (1, f2(1)) and (2, f2(2)) through which f2(x) passes.
Referring to
In the (3, (0), 8) secret sharing method, when the adversary acquires two shares, it may be possible to deduce information on the secret S using vulnerability of a predetermined share p7.
However, in the (3, (1), 8) secret sharing method, the secret S may not be found by two shares and no information on S may not also be deduced.
Referring to
Referring to
When a threshold t is increased in the conventional (t, n) secret sharing or the (t, (0), n) secret sharing method which does not use any hardening share, the security for an attack may be increased. For example, when a (t+1, n) or (t+1, (0), n) secret sharing method is used, the adversary should acquire (t+1) shares, so the security for the attack is increased. However, when the method is compared with the (t+1, (m), n) secret sharing method, the security of the (t+1, (m), n) secret sharing method may be relatively excellent in the same scheme as the above description.
Last, when the present disclosure is applied, multi-factor secret sharing using knowledge of the user, such as the password and inherence of the user, such as the biometric information as the share is enabled. Electronic hacking for the password is impossible, and electronic hacking for the biometric information is difficult, and at the same time, a replication risk for the biometric information is also low. Further, a separate digital device for keeping the password or biometric information is not required, and moreover, the usability of the secret sharing system may be improved due to excellent accessibility.
Features, structures, and effects described in the above exemplary embodiments are included in at least one embodiment of the present disclosure, and are not particularly limited to only one exemplary embodiment. Furthermore, features, structures, and effects exemplified in each embodiment may be combined or modified for other exemplary embodiments those skilled in the art to which the exemplary embodiments pertain. Therefore, the contents related to such combinations and modifications should be interpreted as being included in the scope of the present disclosure.
In addition, although the exemplary embodiments have been mainly described above, these are merely examples and do not limit the present disclosure, and those skilled in the art to which the present disclosure pertains will be able to know that various modifications and applications not illustrated above may be made within the scope without departing from the essential characteristics of the exemplary embodiment. For example, each component specifically shown in the exemplary embodiment may be implemented by being modified. In addition, it will be interpreted that differences related to the modifications and applications are included in the scope of the present disclosure defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2023-0046386 | Apr 2023 | KR | national |