The present application is a 371 U.S. national filing of PCT application, Application No. PCT/IE02/00050, filed Apr. 18, 2002, which claims priority from Irish patent application S2001/0423, filed Apr. 27, 2001, which are hereby incorporated by reference herein in their entireties.
The present invention relates to a system and method for processing a shared secret. In particular, the invention relates to obtaining a shared secret from a set of arbitrary numbers.
In “How to Share a Secret”, A. Shamir, Communications of the ACM, vol. 22, pp. 612-613, 1979 (Shamir) there is described a method whereby, given two numbers n and m, where m<n, an arbitrary secret can be split into n parts (shares), such that any m of the resulting shares can be combined to recover the original secret. The technique ensures that anyone who has less than m shares is no better off than if they had no shares at all. This technique also allows the sharing of a secret such that any m of n shareholders can reconstruct the secret without revealing their shares.
Referring now to
y=ax3+bx2+cx+d
Conventionally, the y value at x=0 is taken to be a secret, and shares in the secret, comprising values from which other y values can be derived, are distributed across n share-holders, in this case n=6, typically servers with which a client computer can connect securely. Using simultaneous equations it will be seen that given any four points, say (x1,y1); (x2,y2); (x3,y3) and (x4,y4) on a curve, then any other point on the curve including the secret can be determined—so here m=4.
In, “Server-Assisted Generation of a Strong Secret from a Password”, W. Ford and B. Kaliski, Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, NIST, Gaithersburg Md., Jun. 14-16, 2000 (Ford-Kaliski) which in turn refines “Strong Password-Only Authenticated Key Exchange”, D. Jablon, Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, pp. 5-26, October 1996 (Jablon) there is disclosed a technique (SPEKE) for securely retrieving a number from, for example, a remote server without revealing a password to the remove server.
So, referring to
Using Ford-Kaliski, once a secret has been constructed by a secret generation component 14, the user can supply their password to the application on the client machine and a secret re-construction component 16 of the application connects to all n servers and without disclosing the password, securely obtains m shares yi. Points (xi) on a curve, for example a curve of the type shown in
It can be seen from
Many patents reference Shamir, and largely fall into one of a number of categories:
Patents which reference Shamir's paper, but do not make use of secret sharing techniques:
U.S. Pat. No. 5,553,145; U.S. Pat. No. 5,629,982; U.S. Pat. No. 5,666,420; U.S. Pat. No. 6,134,326; U.S. Pat. No. 6,137,884; and U.S. Pat. No. 6,141,750: Simultaneous electronic transactions with subscriber verification;
U.S. Pat. No. 5,812,670: Traceable anonymous transactions; and
U.S. Pat. No. 6,055,508: Method for secure accounting and auditing on a communications network.
Patents which disclose secret sharing for fault-tolerant transmission:
U.S. Pat. No. 5,485,474: Scheme for information dispersal and reconstruction; and
U.S. Pat. No. 6,012,159: Method and system for error-free data transfer.
Patents which disclose secret-sharing techniques, where the secret is not updated, as in:
U.S. Pat. No. 5,315,658; U.S. RE036,918: Fair cryptosystems and methods of use;
U.S. Pat. No. 5,495,532: Secure electronic voting using partially compatible homomorphisms;
U.S. Pat. No. 5,666,414: Guaranteed partial key-escrow;
U.S. Pat. No. 5,708,714: Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatus;
U.S. Pat. No. 5,768,388: Time delayed key escrow;
U.S. Pat. No. 5,825,880: Multi-step digital signature method and system;
U.S. Pat. No. 5,903,649: Method for establishing a common code for authorized persons through a central office;
U.S. Pat. No. 5,991,414: Method and apparatus for the secure distributed storage and retrieval of information;
U.S. Pat. No. 6,192,472: Method and apparatus for the secure distributed storage and retrieval of information; and
U.S. Pat. No. 6,026,163: Distributed split-key cryptosystem and applications.
Miscellaneous patents, such as:
U.S. Pat. No. 5,764,767: System for reconstruction of a secret shared by a plurality of participants, which provides a mechanism for updating a shared secret, however, all the locations where the secrets are stored are active participants in updating the secret;
U.S. Pat. No. 5,867,578: Adaptive multi-step digital signature system and method of operation thereof, where the shares change but the value of the shared secret is maintained; and
U.S. Pat. No. 6,122,742: Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys, which uses a shared function, not a shared secret.
Pieprzyk discloses a method of constructing shares in a secret k comprising the steps of: determining n shares for an n-of-n secret sharing scheme, each share comprising a value y; storing at least some of said shares in computing devices such that at least m of said n shares are reliably accessible; and determining the shared secret k according to said shares y.
It will be seen, however, that none of these documents discloses being able to update a shared secret without having access to all the shareholders of the secret. This becomes an important requirement when clients such as that shown in
According to a first aspect of the present invention there is provided, a method characterised by m being less than n and by the steps of: determining a further (n-m) shares consistent with the shared secret k and the shares y; and storing the additional shares in a reliably accessible location.
According to a second aspect of the invention, there is provided in a network comprising a number of computing devices, each arranged to securely store at least one share in a secret k for which n shares are required to reconstruct the secret and to which access to a number m of said shares can be reliably provided at any given time, a method of reconstructing said secret comprising the steps of: securely obtaining m shares from one or more secret share holders including at least one of said computing devices; characterised by m being less than n and by the steps of: obtaining (n-m) shares from a reliably accessible location; and constructing the shared secret k according to said obtained shares.
There is further provided a method of updating the secret employing the second aspect of the invention.
Further aspects of the invention are embodied as respective apparatus and computer program products for generating and constructing and updating a shared secret.
In contrast with the prior art where clearly it is considered essential that none of the shares of a secret is public, the present invention uses additional public shares to implement the invention.
In the present invention some of the shareholder storage locations need not be aware that an update to a shared secret is occurring. The invention therefore allows the following two operations:
The invention is particularly useful because it is not necessarily the case that n random numbers will form a consistent m-from-n set of shares. However, there may be cases (as will be explained below) where an entity has access to several separate, long-lived and random values and cannot guarantee that it will have access to all of them at any one time. In this case, this invention allows the entity to combine the values from different locations in such a way that if the entity doesn't contact them all, it doesn't matter; and if an attacker is able to intercept the values from any number less than m of the locations, that attacker will be unable to reconstruct the secret from the intercepted values.
Various embodiments of the invention will now be described by way of example with reference to the accompanying drawings in which:
The principle of operation of the invention is explained in relation to
To update the secret, again any three of the secret shares obtained (in this case (x1,y1); (x2,y2); and (x4,y4)) along with the public share (x5,y5) are used to determine the secret. The secret is then changed to (0, New secret) and each of the three secret share values as well as the public share (x5,y5) value are updated, but leaving the share value of any unobtained shares, in this case (x3,y3), unchanged.
Extending the principle further, if it is decided that communication can only be established reliably with say 2 of the four shareholders, then two public shares are generated and stored at the credentials server 20′. The scheme now becomes a 4-from-6 scheme, where two of the shares are public. Thus, any two of the secret shares can be combined with the public shares to re-generate the secret.
It will, therefore, be seen that in an m-from-n secret sharing scheme, for each share (n-m) on which the client does not wish to rely to re-generate or update the secret, an additional public share is generated, thereby giving an n-from-(2n-m) scheme where n-m of the shares are public.
While the above examples appear to lessen the level of security by reducing the number of secret shares required from a starting point with a given number of servers, it will be seen that any level of security and redundancy can be employed using the invention. Thus, for any required level of security, that is secret shares required m, and redundancy, that is total servers less required shares (n-m), then using the invention (n-m) additional shares are employed within a conventional n-from-(2n-m) scheme.
Referring now to
To get a secret, which can be reconstructed given only m of the yi, a secret generation component 14′ of the application 12, does the following:
To reconstruct the secret in subsequent sessions, the secret re-construction component 16′ does the following:
Since the client now has n of the shares, the secret generation component 16′ can now reconstruct the secret k and so the client application 12 or other client applications can use the secret to, for example, decrypt the encrypted private key for the user of the client machine.
The above technique can be used to update the secret even in the case where not all the data storage devices Bi are online. In the update procedure, a secret update component 18′ does the following:
In a more detailed example, the secret sharing scheme is based on Shamir's scheme which uses Lagrange polynomial interpolation over the group Z*p, where P is a 1024-bit prime number and the random numbers are obtained using a refinement of the Ford-Kaliski scheme which, in turn, refines Jablon's SPEKE technique.
The system is based on two primes: p, a large (typically 1024-bit) prime with respect to which we perform modular exponentiation; and r, which is the smallest prime that is 160 bits long.
To generate share-holder servers' shares, the secret generation component 14′ generates a number g<p from the user provided password. For each server Bi, the component 14′:
Note that all the yi will be less than r and that the client now has n shares yi, i=1 to n. There is one polynomial f( ) of degree (m−1) over the integers mod r, which passes through the n points (i, yi).
To generate the additional shares, the secret generation component 14′:
To recombine the shares, the secret re-construction component 16′:
Once the secret has been re-constructed it can be updated as outlined previously.
While the preferred embodiments described above are illustrative of the invention, it will be seen that many variations of the invention are possible.
For example, it is not necessary that the additional public shares are stored on the server 20′ remote from the client 10, only that the additional shares are reliably accessible when the secret is to be updated. So, for example, the additional shares may be stored in any computer readable medium such as a floppy disk, smart card etc.
It will also be seen that the components 14′, 16′, 18′ incorporating the invention need not all be included in the same application. Specifically, the secret generation and updated components may run in applications or even computers independently of the stand alone secret re-construction component.
Similarly, it will be seen that not all secret shares need to be stored on remote servers only that at least m of the n shares are reliably accessible when the secret is to be re-constructed or updated. So, for example, the secret shares may be stored in any computer readable medium such as a floppy disk, smart card etc.
It will also be seen that the invention is not strictly limited to the use of either the Shamir secret sharing technique or the Ford-Kaliski technique for securely obtaining secret shares. So, for example, it is not strictly necessary that the share values are used to construct a polynomial of the type employed to illustrate the operation of the invention.
Finally, it will be seen that the claims are not strictly limited to the order of the steps or features recited and that where possible the invention can be implemented in any order or even with steps being performed in parallel.
| Number | Date | Country | Kind |
|---|---|---|---|
| S2001/0423 | Apr 2001 | IE | national |
| Filing Document | Filing Date | Country | Kind | 371c Date |
|---|---|---|---|---|
| PCT/IE02/00050 | 4/18/2002 | WO | 00 | 10/16/2003 |
| Publishing Document | Publishing Date | Country | Kind |
|---|---|---|---|
| WO02/088912 | 11/7/2002 | WO | A |
| Number | Name | Date | Kind |
|---|---|---|---|
| 5315658 | Micali | May 1994 | A |
| 5485474 | Rabin | Jan 1996 | A |
| 5495532 | Kilian et al. | Feb 1996 | A |
| 5553145 | Micali | Sep 1996 | A |
| 5625692 | Herzberg et al. | Apr 1997 | A |
| 5629982 | Micali | May 1997 | A |
| 5666414 | Micali | Sep 1997 | A |
| 5666420 | Micali | Sep 1997 | A |
| 5675649 | Brennan et al. | Oct 1997 | A |
| 5708714 | Lopez et al. | Jan 1998 | A |
| 5764767 | Beimel et al. | Jun 1998 | A |
| 5768388 | Goldwasser et al. | Jun 1998 | A |
| 5812670 | Micali | Sep 1998 | A |
| 5825880 | Sudia et al. | Oct 1998 | A |
| 5867578 | Brickell et al. | Feb 1999 | A |
| 5903649 | Schwenk | May 1999 | A |
| 5991414 | Garay et al. | Nov 1999 | A |
| 6012159 | Fischer et al. | Jan 2000 | A |
| 6026163 | Micali | Feb 2000 | A |
| 6035041 | Frankel et al. | Mar 2000 | A |
| 6055508 | Naor et al. | Apr 2000 | A |
| 6122742 | Young et al. | Sep 2000 | A |
| RE36918 | Micali | Oct 2000 | E |
| 6134326 | Micali | Oct 2000 | A |
| 6137884 | Micali | Oct 2000 | A |
| 6141750 | Micali | Oct 2000 | A |
| 6182214 | Hardjono | Jan 2001 | B1 |
| 6192472 | Garay et al. | Feb 2001 | B1 |
| 6477254 | Miyazaki et al. | Nov 2002 | B1 |
| 6587946 | Jakobsson | Jul 2003 | B1 |
| 6701435 | Numao et al. | Mar 2004 | B1 |
| 7003677 | Herzberg et al. | Feb 2006 | B1 |
| Number | Date | Country |
|---|---|---|
| 0723348 | Jul 1996 | EP |
| Entry |
|---|
| Blakley, “Safeguarding cryptographic keys,” Proceedings of the AFIPS 1979 national computer conference, AFIPS, 1979, pp. 313-317. |
| Ford et al, “Server-Assisted Generation of a Strong Secret from a Password,” Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, NIST, Gaithersburg MD, Jun. 14-16, 2000, pp. 176-180. |
| Jablon, “Strong Password-Only Authenticated Key Exchange,” Computer Communication Review, ACM SIGCOMM, vol. 26, No. 5, Oct. 1996, pp. 5-26. |
| Naor et al, “Efficient Trace and Revoke Schemes,” In Proceedings of Financial Cryptography, Feb. 2000, pp. 1-24. |
| Pieprzyk et al, “Multiparty key agreement protocols,” IEE Proceedings E. Computers & Digital Techniques, Institution of Electrical Engineers, v. 147, n. 4, Jul. 28, 2000, pp. 229-236. |
| Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, 1979, pp. 612-613. |
| Menezes, et al., “Handbook of Applied Cryptography, Section 12.7”, CRC Press Series on Discrete Mathematics and its Applications, pp., 524-527 & 538-540, Copyright 1997. |
| Number | Date | Country | |
|---|---|---|---|
| 20040117649 A1 | Jun 2004 | US |