Proactive secret sharing or: How to cope with perpetual leakage

Amir Herzberg, Stanisław Jarecki, Hugo Krawczyk, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

509 Scopus citations

Abstract

Secret sharing schemes protect secrets by distributing them over different locations (share holders). In particular, in k out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary is restricted to compromise less than k of the n locations. For long-lived and sensitive secrets this protection may be insufficient. We propose an efficient proactive secret sharing scheme, where shares are periodically renewed (without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. Hence, the adversary willing to learn the secret needs to break to all k locations during the same time period (e.g., one day, a week, etc.). Furthermore, in order to guarantee the availability and integrity of the secret, we provide mechanisms to detect maliciously (or accidentally) corrupted shares, as well as mechanisms to secretly recover the correct shares when modification is detected.

Original languageEnglish
Title of host publicationAdvances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings
EditorsDon Coppersmith
PublisherSpringer Verlag
Pages339-352
Number of pages14
ISBN (Print)3540602216, 9783540602217
DOIs
StatePublished - 1995
Externally publishedYes
Event15th Annual International Cryptology Conference, CRYPTO 19995 - Santa Barbara, United States
Duration: 27 Aug 199531 Aug 1995

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume963
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th Annual International Cryptology Conference, CRYPTO 19995
Country/TerritoryUnited States
CitySanta Barbara
Period27/08/9531/08/95

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1995.

Fingerprint

Dive into the research topics of 'Proactive secret sharing or: How to cope with perpetual leakage'. Together they form a unique fingerprint.

Cite this