Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing

Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an a...

Full description

Bibliographic Details
Main Authors: Seyed Amir Hosseini Beghaeiraveri, Mohammad Izadi, Mohsen Rezvani
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/9428457
id doaj-1a445094840f45498c514ecd3b05e6e1
record_format Article
spelling doaj-1a445094840f45498c514ecd3b05e6e12020-11-25T03:10:13ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/94284579428457Broadcast Complexity and Adaptive Adversaries in Verifiable Secret SharingSeyed Amir Hosseini Beghaeiraveri0Mohammad Izadi1Mohsen Rezvani2DISYS Lab, Computer Engineering Department, Sharif University of Technology, Tehran, IranFaculty of Computer Engineering, Shahrood University of Technology, Shahrood, IranDISYS Lab, Computer Engineering Department, Sharif University of Technology, Tehran, IranVerifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds.http://dx.doi.org/10.1155/2020/9428457
collection DOAJ
language English
format Article
sources DOAJ
author Seyed Amir Hosseini Beghaeiraveri
Mohammad Izadi
Mohsen Rezvani
spellingShingle Seyed Amir Hosseini Beghaeiraveri
Mohammad Izadi
Mohsen Rezvani
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
Security and Communication Networks
author_facet Seyed Amir Hosseini Beghaeiraveri
Mohammad Izadi
Mohsen Rezvani
author_sort Seyed Amir Hosseini Beghaeiraveri
title Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
title_short Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
title_full Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
title_fullStr Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
title_full_unstemmed Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
title_sort broadcast complexity and adaptive adversaries in verifiable secret sharing
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds.
url http://dx.doi.org/10.1155/2020/9428457
work_keys_str_mv AT seyedamirhosseinibeghaeiraveri broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing
AT mohammadizadi broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing
AT mohsenrezvani broadcastcomplexityandadaptiveadversariesinverifiablesecretsharing
_version_ 1715288408441487360