Threshold Things That Think: Authorisation for Resharing

  • Roel Peeters
  • Markulf Kohlweiss
  • Bart Preneel
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)


As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.


Mobile Device Secret Share Scheme Local Counter Threshold Secret Sharing Genuine User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Internet of Things in 2020. Technical report, Joint European Commission / EPoSS Expert Workshop (2008)Google Scholar
  2. 2.
    Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40–46 (1999)CrossRefGoogle Scholar
  3. 3.
    Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. In: Third Symposium on Operating Systems Design and Implementation, New Orleans, USA (1999)Google Scholar
  4. 4.
    Desmedt, Y., Burmester, M., Safavi-Naini, R., Wang, H.: Threshold Things That Think (T4): Security Requirements to Cope with Theft of Handheld/Handless Internet Devices. In: Symposium on Requirements Engineering for Information Security, West Lafayette, Indiana, USA (2001)Google Scholar
  5. 5.
    Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical Report ISSE-TR-97-01, George Mason University (July 1997),
  6. 6.
    Frankel, Y., Gemmell, P., MacKenzie, P.D., Yung, M.: Optimal Resilience Proactive Public-Key Cryptosystems. In: CRYPTO 1997. LNCS, vol. 1294, pp. 384–393. Springer, Heidelberg (1997)Google Scholar
  7. 7.
    Gehrmann, C., Mitchell, C., Nyberg, K.: Manual Authentication for Wireless Devices. RSA Cryptobytes 7(1), 29–37 (2004)Google Scholar
  8. 8.
    Gehrmann, C., Nyberg, K., Mitchell, C.: The personal CA–PKI for Personal Area Network. In: Proceedings of the 11th Information Society Technologies (IST) Mobile and Wireless Communications Summit, pp. 31–35 (2002)Google Scholar
  9. 9.
    Hardekopf, B., Kwiat, K., Upadhyaya, S.: A Decentralized Voting Algorithm for Increasing Dependability. In: Distributed Systems. 5th World MultiConference on Systemic, Cybernetics and Informatics, SCI 2001 (2001)Google Scholar
  10. 10.
    Landrock, P., Pedersen, T.: WYSIWYS? – What you see is what you sign? Information Security Technical Report 3(2), 55–61 (1998)CrossRefGoogle Scholar
  11. 11.
    Laur, S., Pasini, S.: SAS-Based Group Authentication and Key Agreement Protocols. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 197–213. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Nguyen, L.H., Roscoe, A.W.: Efficient group authentication protocols based on human interaction. Cryptology ePrint Archive, Report 2009/150 (2009),
  13. 13.
    Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Wang, S., Safavi-Naini, R.: New Results on Unconditionally Secure Multi-receiver Manual Authentication. In: ICITS 2007. LNCS. Springer, Heidelberg (2007)Google Scholar
  15. 15.
    Wong, T.M., Wang, C., Wing, J.M.: Verifiable Secret Redistribution for Threshold Sharing Schemes. Technical Report CMU-CS-02-114, Carnegie Mellon University (2002)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Roel Peeters
    • 1
  • Markulf Kohlweiss
    • 1
  • Bart Preneel
    • 1
  1. 1.ESAT/SCD/COSIC and IBBTK.U. LEUVENLeuven - HeverleeBelgium

Personalised recommendations