Collusion-resistant threshold decryption

  • Authors:
  • Sigurd Eskeland;Vladimir Oleshchuk

  • Affiliations:
  • Agder University College, Grooseveien, Grimstad, Norway;Agder University College, Grooseveien, Grimstad, Norway

  • Venue:
  • CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most (t, n) threshold-oriented cryptosystems incorporate the polynomial-based (t, n) threshold secret sharing scheme of Shamir. This makes them vulnerable to the collusion problem which imposes two security problems: 1) A set of t colluding participants can compute the shared secret (i.e., a secret polynomial coefficient). Any person holding the shared secret can subsequently carry out group-oriented threshold-oriented computations individually, thereby bypassing the threshold requirement. 2) A set of t participants can moreover deduce all the secret polynomial coefficients which enables establishment of new user shares. In this paper, we propose a method applied to the threshold decryption scheme of Desmedt and Frankel that prohibits colluding participants to deduce any of the secret coefficients of the underlying threshold Shamir secret sharing scheme.