Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/9428457 |
id |
doaj-1a445094840f45498c514ecd3b05e6e1 |
---|---|
record_format |
Article |
spelling |
doaj-1a445094840f45498c514ecd3b05e6e12020-11-25T03:10:13ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/94284579428457Broadcast Complexity and Adaptive Adversaries in Verifiable Secret SharingSeyed Amir Hosseini Beghaeiraveri0Mohammad Izadi1Mohsen Rezvani2DISYS Lab, Computer Engineering Department, Sharif University of Technology, Tehran, IranFaculty of Computer Engineering, Shahrood University of Technology, Shahrood, IranDISYS Lab, Computer Engineering Department, Sharif University of Technology, Tehran, IranVerifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds.http://dx.doi.org/10.1155/2020/9428457 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Seyed Amir Hosseini Beghaeiraveri Mohammad Izadi Mohsen Rezvani |
spellingShingle |
Seyed Amir Hosseini Beghaeiraveri Mohammad Izadi Mohsen Rezvani Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing Security and Communication Networks |
author_facet |
Seyed Amir Hosseini Beghaeiraveri Mohammad Izadi Mohsen Rezvani |
author_sort |
Seyed Amir Hosseini Beghaeiraveri |
title |
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing |
title_short |
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing |
title_full |
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing |
title_fullStr |
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing |
title_full_unstemmed |
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing |
title_sort |
broadcast complexity and adaptive adversaries in verifiable secret sharing |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds. |
url |
http://dx.doi.org/10.1155/2020/9428457 |
work_keys_str_mv |
AT seyedamirhosseinibeghaeiraveri broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing AT mohammadizadi broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing AT mohsenrezvani broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing |
_version_ |
1715288408441487360 |