|
基于NTRU可验证的秘密分享方案
|
Abstract:
随着信息技术的快速发展,数据安全问题日益受到重视。本文提出了一种可验证的秘密分享方案,该方案基于Shamir秘密分享方案,并结合NTRU数字签名算法,增强方案的安全性。NTRU数字签名算法作为一种能够抵抗量子攻击的数字签名算法,有效防御了伪造和篡改攻击,确保了秘密恢复过程的可信度。本文详细分析了方案的正确性和安全性。
With the rapid development of information technology, data security issues are increasingly being taken seriously. This paper proposes a verifiable secret sharing scheme based on the Shamir secret sharing scheme and combined with the NTRU digital signature algorithm to enhance the security of the scheme. The NTRU digital signature algorithm, as a type of digital signature algorithm capable of resisting quantum attacks, effectively defends against forgery and tampering attacks, ensuring the credibility of the secret recovery process. This paper provides a detailed analysis of the correctness and security of the scheme.
[1] | Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. https://doi.org/10.1145/359168.359176 |
[2] | Tassa, T. (2007) Hierarchical Threshold Secret Sharing. Journal of Cryptology, 20, 237-264. https://doi.org/10.1007/s00145-006-0334-8 |
[3] | Kurihara, J., Kiyomoto, S., Fukushima, K. and Tanaka, T. (2008) A New (k,n)-Threshold Secret Sharing Scheme and Its Extension. In Wu, T.C., Lei, C.L., Rijmen, V. and Lee, D.T., Eds., Lecture Notes in Computer Science, Springer, 455-470. https://doi.org/10.1007/978-3-540-85886-7_31 |
[4] | Kumar, P., Banerjee, K., Singhal, N., Kumar, A., Rani, S., Kumar, R., et al. (2022) Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm. Sensors, 22, Article 8620. https://doi.org/10.3390/s22228620 |
[5] | Hazay, C., Mikkelsen, G.L., Rabin, T., Toft, T. and Nicolosi, A.A. (2018) Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. Journal of Cryptology, 32, 265-323. https://doi.org/10.1007/s00145-017-9275-7 |
[6] | Velumani, R., Sudalaimuthu, H., Choudhary, G., Bama, S., Jose, M.V. and Dragoni, N. (2022) Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network. Sensors, 22, Article 2959. https://doi.org/10.3390/s22082959 |
[7] | Yuan, J. and Li, L. (2019) A Fully Dynamic Secret Sharing Scheme. Information Sciences, 496, 42-52. https://doi.org/10.1016/j.ins.2019.04.061 |
[8] | Shor, P.W. (1994) Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, 20-22 November 1994, 124-134. https://doi.org/10.1109/sfcs.1994.365700 |
[9] | Tang, G., Pang, B., Chen, L. and Zhang, Z. (2023) Efficient Lattice-Based Threshold Signatures with Functional Interchangeability. IEEE Transactions on Information Forensics and Security, 18, 4173-4187. https://doi.org/10.1109/tifs.2023.3293408 |
[10] | Rajabi, B. and Eslami, Z. (2019) A Verifiable Threshold Secret Sharing Scheme Based on Lattices. Information Sciences, 501, 655-661. https://doi.org/10.1016/j.ins.2018.11.004 |
[11] | Hoffstein, J., Pipher, J. and Silverman, J.H. (1996) NTRU: A New High Speed Public Key Cryptosystem. Technical Report, presented at the rump session of Annual International Cryptology Conference (CRYPTO). |
[12] | Hoffstein, J., Pipher, J. and Silverman, J.H. (2001) NSS: An NTRU Lattice-Based Signature Scheme. In: Pfitzmann, B., Ed., Lecture Notes in Computer Science, Springer, 211-228. https://doi.org/10.1007/3-540-44987-6_14 |
[13] | Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J.H. and Whyte, W. (2003) NTRUSign: Digital Signatures Using the NTRU Lattice. In: Joye, M., Ed., Lecture Notes in Computer Science, Springer, 122-140. https://doi.org/10.1007/3-540-36563-x_9 |
[14] | Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H. and Whyte, W. (2014) Transcript Secure Signatures Based on Modular Lattices. In: Mosca, M., Ed., Lecture Notes in Computer Science, Springer International Publishing, 142-159. https://doi.org/10.1007/978-3-319-11659-4_9 |
[15] | 杨真真, 蔺大正, 张东巍, 等. 一种基于NTRU的数字签名方案[C]//通信理论与技术新进展——第十一届全国青年通信学术会议论文集. 2006. |
[16] | 胡予濮. 一个新型NTRU类数字签名方案[J]. 计算机学报, 2008, 31(9): 1661-1665. |
[17] | 张卷美, 曹杰, 刘年义, 等. 一种基于NTRU新型签名方案的设计[J]. 四川大学学报(工程科学版), 2015, 47(1): 49-53. |
[18] | Bogdanov, D. (2007) Foundations and Properties of Shamir’s Secret Sharing Scheme Research Seminar in Cryptography. University of Tartu, Institute of Computer Science. |
[19] | Khorasgani, H.A., Asaad, S., Eghlidos, T. and Aref, M. (2014) A Lattice-Based Threshold Secret Sharing Scheme. 2014 11th International ISC Conference on Information Security and Cryptology, Tehran, 3-4 September 2014, 173-179. https://doi.org/10.1109/iscisc.2014.6994043 |
[20] | Asaad, S., Khorasgani, H.A., Eghlidos, T. and Aref, M. (2014) Sharing Secret Using Lattice Construction. 7th International Symposium on Telecommunications (IST’2014), Tehran, 9-11 September 2014, 901-906. https://doi.org/10.1109/istel.2014.7000831 |
[21] | Steinfeld, R., Pieprzyk, J. and Wang, H. (2007) Lattice-based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Transactions on Information Theory, 53, 2542-2559. https://doi.org/10.1109/tit.2007.899541 |
[22] | Amroudi, A.N., Zaghain, A. and Sajadieh, M. (2017) A Verifiable (k,n,m)-Threshold Multi-Secret Sharing Scheme Based on NTRU Cryptosystem. Wireless Personal Communications, 96, 1393-1405. https://doi.org/10.1007/s11277-017-4245-9 |
[23] | Ogata, W. and Araki, T. (2017) Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 100, 103-114. https://doi.org/10.1587/transfun.e100.a.103 |
[24] | Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B. (1985) Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. 26th Annual Symposium on Foundations of Computer Science, Portland, 21-23 October 1985, 383-395. https://doi.org/10.1109/sfcs.1985.64 |
[25] | Stadler, M. (1996) Publicly Verifiable Secret Sharing. In: Maurer, U., Ed., Lecture Notes in Computer Science, Springer, 190-199. https://doi.org/10.1007/3-540-68339-9_17 |
[26] | Albrecht, M. and Ducas, L. (2021) Lattice Attacks on NTRU and LWE: A History of Refinements. https://eprint.iacr.org/2021/799 |