Any scheme must pass through formal and Informal analysis to verify its applicability in current scenario. In proposed scheme, We have used Random Oracle Modal (RoM) for formal analysis. In informal analysis we have proved our scheme safe from several attacks.
6.2.1. Formal Security Analysis (Random Oracle Model)
A cryptographic hash function H is treated as a really random function by the random-oracle model. The random-oracle model more particularly hypothesises the existence of a public, random function
H that can only be evaluated by "querying" an oracle, which can be thought of as a "black box," that returns
when given input
x. A formal approach that can be used to create and verify cryptographic methods is provided by the random-oracle model. In 2014, Herranz et al. [
23] provided the formal definition of security for MSS in the random oracle model. Moreover, they proposed an MSS formally proved its computational security in ROM. As far as we know, that is an MSS’s first formal security analysis. Security analysis of multi secret sharing scheme has been performed by [
31]. In this section, we prove the computational security of the proposed scheme
assuming that the hash function
H behaves as a random oracle.
Before we proceed with the proof, the following are the assumptions:
We assume the proposed scheme as the set of tuples, where Int stands for Intilization/setup phase, dist stands for distribution and Rec is for recovery phase.
-
PP(Public parameters)=
There is an adversary contains set of participants and threshold value t.
Theorem For an adversary
, we have
here adversary makes at most
queries to the random oracle for H against the GMS and
.
Proof For proof we follow the following steps:
Step1 We act as the challenger of the security game
described in [
31].
Step2 We pass public parameters to the initialization algorithm and send the result to the adversary.
Step3 broadcast , we choose ,
Step4 after masking hash query x to the random oracle H, if then abort the game, otherwise proceed for the next step.
Step4 a random value is is chosen and send to adversary. At the same time, is saved in the table.
Step4 Two global secrets
are broadcasted by adversary
.
Step5 We choose a random value such that for and adversary doesn’t query to the random oracle H.
Step6 a random polynomial is chosen where, and compute and and again store in the hash table. Similarly choose l no. of random values and store in the hash table.
Step7 Choose a random bit and compute and give shares of corrupted players . along with this public output are also shared.
Step8 after continuous query to
, adversary
, outputs a bit
which is defined in the following equation
from above steps, we conclude that
is not allowed to query
such that
and
.