Skip to main content

2021 | OriginalPaper | Buchkapitel

Password Protected Secret Sharing from Lattices

verfasst von : Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo, Reihaneh Safavi-Naini

Erschienen in: Applied Cryptography and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A password protected secret sharing (\(\mathsf {PPSS}\)) allows a user to store shares of a secret on a set of L servers, and use a single password to authenticate itself to any subset of k servers at a later time to access the shares and reconstruct the secret. Security of \(\mathsf {PPSS}\) ensures that a coalition of up to \(k-1\) servers cannot reveal any information about the secret message or the password. A related primitive is threshold password authenticated key exchange protocol (\(\mathsf {TPAKE}\)) that allows a user to establish individual authenticated shared secret keys with members of a subset of k out of L servers, using a single password. These primitives are well motivated, with applications such as secure storage of secret keys, and secure group communication using passwords for authentication. In this paper, we give the first construction of these primitives that provide post-quantum security. We prove security of our constructions in concurrent setting, and in the standard model, reducing security to the decisional LWE problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Throughout the paper, we will denote FHE of [11] by \(\mathsf {GSW}\) scheme. The acronym is the authors’ initials.
 
2
It is worth mentioning that the secret key https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-78372-3_17/509977_1_En_17_IEq82_HTML.gif does not play any role at any point during the execution of \(\mathsf {Rec}\). Thus user neither requires https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-78372-3_17/509977_1_En_17_IEq84_HTML.gif to be shared and stored among the servers nor to keep it with her - she can delete https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-78372-3_17/509977_1_En_17_IEq85_HTML.gif after executing the \(\mathsf {Init}\).
 
Literatur
3.
Zurück zum Zitat Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: CCS 2011, pp. 433–444 (2011) Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: CCS 2011, pp. 433–444 (2011)
4.
Zurück zum Zitat Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72–84 (1992) Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72–84 (1992)
5.
Zurück zum Zitat Camenisch, J., Lehmann, A., Neven, G.: Optimal distributed password verification. In: CCS 2015, pp. 182–194 (2015) Camenisch, J., Lehmann, A., Neven, G.: Optimal distributed password verification. In: CCS 2015, pp. 182–194 (2015)
6.
Zurück zum Zitat Camenisch, J., Lysyanskaya, A., Neven, G.: Practical yet universally composable two-server password-authenticated secret sharing. In: CCS 2012, pp. 525–536 (2012) Camenisch, J., Lysyanskaya, A., Neven, G.: Practical yet universally composable two-server password-authenticated secret sharing. In: CCS 2012, pp. 525–536 (2012)
10.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, pp. 197–206 (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, pp. 197–206 (2008)
13.
Zurück zum Zitat Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: Highly-efficient and composable password-protected secret sharing (or: How to protect your bitcoin wallet online). In: EuroS&P 2016, pp. 276–291. IEEE (2016) Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: Highly-efficient and composable password-protected secret sharing (or: How to protect your bitcoin wallet online). In: EuroS&P 2016, pp. 276–291. IEEE (2016)
18.
Zurück zum Zitat Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)MathSciNetCrossRef Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)MathSciNetCrossRef
19.
Zurück zum Zitat Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039), pp. 543–553. IEEE (1999) Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: 40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039), pp. 543–553. IEEE (1999)
Metadaten
Titel
Password Protected Secret Sharing from Lattices
verfasst von
Partha Sarathi Roy
Sabyasachi Dutta
Willy Susilo
Reihaneh Safavi-Naini
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-78372-3_17