Abstract
The learning with errors (LWE) problem has emerged as the most popular hard problem for constructing lattice based cryptographic solutions. In this paper, we propose a verifiable multi secret sharing scheme based on LWE problem and prove the security of our scheme in the standard model. It is a threshold scheme and every t participants (t ≤ n) can recover multiple secrets, in one stage. Moreover, it has a non-interactive verification and no extra communication is needed among participants and the dealer in the verification phase. In short, it is the first LWE based threshold multi secret sharing scheme that has formal security in the standard model.
Similar content being viewed by others
References
Amini Khorasgani H, Asaad S, Eghlidos T, Aref MR (2014) A lattice-based threshold secret sharing scheme. In: 11th Int. ISC Conf. on Inf. Security Cryptology. IEEE, pp 173–179
Amini Khorasgani H, Asaad S, Pilaram H, Eghlidos T, Aref MR (2016) On the design and security of a lattice-based threshold secret sharing scheme. The ISC intl journal of information security pp 25–38
Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: Proceedings of the twenty-eighth annual ACM symposium on theory of computing. ACM, New York, pp 99–108
Biggs N (2002) Discrete mathematics, 2nd Edition Oxford University Press
Bernstein D, Buchmann J, Dahmen E (2009) Post-Quantum cryptography springer
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 national computer conference, pp 313–317
Blundo C, De Santis A, Di Crescenzo G, Gaggia AG, Vaccaro U (1994) Multi-secret sharing schemes, advances in cryptology CRYPTO94, Springer, pp 150–163
Chen D, Lu W, Xing W, Wang NN (2019) An efficient verifiable threshold Multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110
Chor B, Goldwasser Sh, Micali S, Awerbuch B (1985) Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). FOCS. pp 383–395
Dehkordi MHS, Mashhadi H, Oraei A (2018) Proactive multi stage secret sharing scheme for any given access structure. Wirel Pers Commun 104:491–503
El Bansarkhani R, Meziani M (2012) An efficient lattice-based secret sharing construction, information security theory and practice. Security, privacy and trust in computing systems and ambient intelligent ecosystems, ser. Lecture notes in computer science, Springer. vol 7322. pp 160–168
Georgescu A (2011) A lwe-based secret sharing scheme. IJCA special issue on network security and cryptography NSC(3):27–29
Goldreich O, Goldwasser S, Halevi S (1996) Collision-free hashing from lattice problems
Goldreich O, Goldwasser S, Halevi S (1997) Public-key cryptosystems from lattice reduction problems. Advances in Cryptology CRYPTO 97, Lecture Notes in Computer Science, Springer vol 1294 pp 112–131
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591–5619
Hadian M, Ghasemi R (2016) A lightweight public verifiable multi secret sharing scheme using short integer solution. Wirel Pers Commun 91:1459–1469
Hoffstein J, Pipher J, Silverman J (1998) Ntru: a ring-based public key cryptosystem. In: Buhler J (ed) Algorithmic number theory. Lecture notes in computer science, vol 1423. Springer Berlin Heidelberg, pp 267–288
Karimani S, Naghdabadi Z, Eghlidos T, Aref MR (2019) An LWE-based verifiable threshold secret sharing scheme. Mat Vopr Kriptogr 10(2):97–106
Knospe H (2019) A course in cryptography, american mathematical society american mathematical society
Li Ch, Tian Y, Chen X, Li J (2021) An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Inf Sci 546:253–264
Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimed Tools Appl 78:17973–17994
Lipshutz S, Lipson M (2017) Schaum’s outlines linear algebra. McGraw-Hill Eduction, Sixth Edition
Liu W, Liu Z, Nguyen Kh, Yang G, Yu Y (2020) A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key. European symposium on research in computer security, ESORICS 2020, pp 357–377
Mashhadi S (2020) A CSA-secure multi-secret sharing scheme in the standard model. J Appl Secur Res 15:84–95
Mashhadi S (2015) Computationally secure multiple secret sharing: models, schemes, and formal security analysis. ISC Int J Inf Secur 7:91–99
Mashhadi S, Dehkordi MH, Kiamari N (2017) Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. IET Inf Secur 11(6):326–331
McEliece R. J. (1978) A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 42(44):114–116
Mesnager S, Sinak A, Yayla O (2020) Threshold-based post-quantum secure verifiable multi-secret sharing for distributed storage blockchain. Mathematics 8:22189. https://doi.org/10.3390/math8122218
Miao F, Wang L, Ji Y, Xiong Y (2017) GOMSS: a simple group oriented (t, m, n) multi-secret sharing scheme. Chin J Electron 26(3):557–563
Mishra A, Gupta A (2018) Multi secret sharing scheme using iterative method. J Inf Optim Sci 39:631–641
Pilaram H, Eghlidos T (2015) An efficient lattice based multi-stage secret sharing scheme. IEEE Trans Dependable Secur Comput 14:2–8
Rajabi B, Eslami Z (2019) A verifiable threshold secret sharing scheme based on lattices. Inf Sci 501:655–661
Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM 56(6):34–40
Sehrawat VS, Yeo FY, Desmedt Y Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification. Thorical Computer Science, 2021. https://doi.org/10.1016/j.tcs.2021.07.022
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Sheikhi M, Bahramian M, Doche C (2019) Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. IET Inf Secur 13:278–284
Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th annual symposium on foundations of computer science, Washington, DC, USA, pp 124–134
Wu F, Yao W, Zhang X, Zheng Z (2019) Lattice based signature with outsourced revocation for multimedia social networks in cloud computing. Multimed Tools Appl 78:3511–3528
Xu Z, He D, Vijayakumar P, Kwang K, Choo R, Li L (2020) Efficient NTRU lattice-based certificateless signature scheme for medical cyber-physical systems. J Med Syst 44(92):. https://doi.org/10.1007/s10916-020-1527-7
Yang Y, Zheng X, Chang V, Ye Sh, Tang Ch (2018) Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimed Tools Appl 77:9927–9941
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kiamari, N., Hadian, M. & Mashhadi, S. Non-interactive verifiable LWE-based multi secret sharing scheme. Multimed Tools Appl 82, 22175–22187 (2023). https://doi.org/10.1007/s11042-022-13347-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13347-4