Fully dynamic secret sharing schemes
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Threshold Schemes with Disenrollment
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Dynamic Threshold Public-Key Encryption
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
FOCS '10 Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science
Achieving leakage resilience through dual system encryption
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Leakage-resilient coin tossing
DISC'11 Proceedings of the 25th international conference on Distributed computing
Storing Secrets on Continually Leaky Devices
FOCS '11 Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Identity-based encryption resilient to continual auxiliary leakage
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is proposed to capture this situation. In the continual leakage model, the attacker can continuously leak the private value owned by the user with the constraint that the information leaked should be less than ℓ between updates. We propose continual leakage-resilient dynamic secret sharing under split-state model in this paper. After a preprocessing stage, the dealer is able to dynamically choose a set of n users and to allow a threshold of t users to reconstruct different secrets in different time instants, by using the same broadcast message. The secrets are protected even if an adversary corrupts up to t−1 users and obtains continual leakage from the rest of them. Our scheme can provide the security for secret sharing under continual leakage model while at the same time allowing the users to join and quit the scheme dynamically.