Preprint
Article

A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

Altmetrics

Downloads

112

Views

45

Comments

0

A peer-reviewed article of this preprint also exists.

Submitted:

30 May 2024

Posted:

30 May 2024

You are already at the latest version

Alerts
Abstract
Sharing confidential information is a critical concern in today’s world. Secret sharing schemes facilitate the sharing of secrets in a way that ensures only authorized participants (shareholders) can access the secret using their allocated shares. Hierarchical secret sharing schemes (HSSSs) build upon Shamir’s scheme by organizing participants into different levels based on priority. Within HSSS, participants at each level can reconstruct the secret if a specified number, denoted as the threshold value (t), or more of them are present. Each level has a predetermined threshold value. If the number of participants falls below the threshold at any level, higher-level participants must be involved in reconstructing the secret at lower levels. Our paper proposes schemes that implement hierarchical access structures and enable the sharing of multiple secrets. Additionally, our proposed scheme includes share verification. We have analyzed potential attacks and demonstrated the scheme’s resistance against them. Through security analysis and comparison with existing schemes, we highlight the novelty and superiority of our proposed approach, contributing to advancements in secure information sharing practices.
Keywords: 
Subject: Computer Science and Mathematics  -   Computer Networks and Communications

1. Introduction

Information such as encryption keys, missile launch codes, and numbered bank accounts must be highly confidential. Exposure to such sensitive information could be dangerous. Secret sharing schemes provide an efficient way of storing such sensitive and vital information and prevent unauthorized access. Apart from core cryptography, Researchers have been using secret sharing concepts in various applications such as the cloud and IoT. Recently, Gutte and Paraser [15] have used secret sharing for visual cryptography and suggested a weed optimization algorithm for image sharing. Similarly, Wang et al. [44] , and Ren et al. [35] have worked on low latency cloud-based indoor localization system and secure, anonymous data aggregation schemes, respectively. Considerable work has been done on this topic during the last few years (cf.; [9,12,19,24,26,32,34,36,42] where further references can be found).
Initially, some core concepts of algebra were used by authors to design secret sharing schemes. Shamir [39] used polynomials, Blakley [6] used hyperplane geometry and Simmons [40] as well as Asmuth and Bloom [1] used Chinese remainder theorem. In secret sharing schemes, secret S is distributed among n shareholders P 1 , P 1 , , P n in such a way that t shareholders or more than t shareholders can reconstruct the secret but less than t shareholders know nothing about the secret. Such a scheme is known as the ( t , n ) -threshold scheme. Schemes given by [1,6,39] have several common drawbacks as follows:
  • These are single secret sharing schemes.
  • For every new secret, a new share has to be generated for every participant after the reconstruction of the previous secret
  • Private channels are essential for the communication between dealers and participants and among the participants.
  • These schemes are not capable of identifying the cheater.
To solve the first and the second problem, "multi secret sharing schemes" have been introduced [20,21,25]. Instead of having a single secret, multiple secrets are shared among the participants in a multi-secret sharing scheme. To include verification and cheater detection, a "Verifiable secret sharing scheme" was proposed in [13,43]. In [17,18], Harn et al. proposed the protected secret sharing scheme to avoid a separate communication channel while exchanging shares among different shareholders. The application of Shamir’s scheme is an ideal for the condition where all participants(shareholders) play the same role and there is no distribution of share-based on priority or any unique properties. However, employees are categorized based on their work responsibilities in organizations such as multinational companies and educational institutions. Among several structures, the Hierarchical structure is trendy in which every participant has some weight according to his/her role. Shares are distributed or assigned according to their weight. Hierarchical secret sharing schemes are proposed in the literature, [2,30,40,48,49] .
In hierarchical secret sharing schemes, all the participants are divided into m disjoint sets called levels say l 1 , l 2 , . . . l m . The i t h level consists of n i participants with t i threshold. In reconstruction of the secret there may be two situations: In the first situation particular level l i has t i or more participants on the same level while in the other situation the number of participants in level l i is less than t i . In the second situation involvement of the higher level participant is needed.
Let us assume that in a particular level l i participants are less in number say r i , than the t i . So t i r i remaining participants are needed from the upper level to reconstruct the secret. In this paper the level l i is higher than the level l i + 1 , 1 i < m .
In 2004, Yang et al. [46] proposed a unique multi-secret sharing scheme using a single polynomial, known as the YCH scheme. Low computation and less number public values are required in the YCH scheme. In the YCH scheme, a single polynomial is used for multiple secrets instead of using separate polynomials for individual secrets. We have included a YCH scheme for each level in our work, making the scheme efficient. We have used two variable one-way functions for verifiability, which verify the dealer and other participants. Here we summarize the contribution of this paper:
  • Proposed scheme is efficient due to the use of YCH scheme.
  • The proposed scheme can quickly identify the cheater, whether the dealer or the other participants.
  • Participant’s share can be used for both the reconstruction and verification.
The rest of the paper is organized as follows. In Section 2, related literature is explained. In Section 3, we present preliminaries related to our proposed scheme. Section 4 deals with the identification of problems and motivation. Our proposed scheme is discussed in Section 5. In Section 6, the security and performance analysis of the scheme is discussed. In Section 7, a comparison with exiting schemes is explained. Finally, we conclude the paper with future work in Section 8.

2. Related Work

The Shamir [39] and Blakley [6] threshold secret sharing schemes are two particular examples of hierarchical secret sharing (HSS) in which all participants have the same privileges. In order to improve the applicability of hierarchical secret sharing, many researchers have focused on specific families of access structures. Blundo et al. [7] have focused on graph-based access structure, Pardo et al. [33] explained bipartite access structure and Tentu et al. [41] includes multipartite access structure, compartmented access structure, and hierarchical access structure.
In 1979, the weighted thresold secret sharing mechanism was suggested by Shamir [39]. However, this approach is inefficient since it assigns multiple shares to each participant equal to its integral weight. Simmons [40] then proposed a multipartite access structure in 1988, defining the compartmented access structure and the hierarchical access structure. Following Simmons, Brickell [8] proposed a strategy for constructing an optimal secret sharing scheme that takes into account multilevel and compartmented access arrangements. However, the approach is inefficient since nonsingular matrices require exponential operations. The multipartite access structure is defined as the split of all members of a group into subsets, with members of the same subset having the same rights. The compartmented access structure and the hierarchical access structure are two types of multipartite access structures. The conjunctive hierarchical access structure and the disjunctive hierarchical access structure belong to the hierarchical access structure family. In 2009, Lin et al. [28] had incorporated some modifications to Shamir’s scheme [39] and explained hierarchical secret sharing(HTSS) scheme with two types of variations." Multilevel threshold secret sharing (MTSS), and compartmented threshold secret sharing (CTSS)".
Verification of shares is also one of the major concerns in secret sharing schemes. In [13,43] authors have specifically explained the verification of shares in a secret sharing scheme. In 2015, Chanu et al. [10] used Two variable one-way functions to verify the correctness of the received share. Further, in 2017, Basit et al. [4] used Shamir’s scheme with the successive application of one-way function and shifted and key technique to propose Multi-stage, Multi-secret sharing for hierarchical Access Structure.
Apart from the above papers, the Hierarchical secret sharing (HSSS) scheme are discussed in [3,4,10,17,28,29,47], but his scheme lacks fairness. In 2018, Banerjee et al.[3] proposed Cheating detection and cheater Identification for hierarchical structure but lacks correctness. In 2021 Bisht and Deshmukh [5] proposed work on multi-level secret sharing but lacks fairness and perfectness. Similarly, Yuan et al. [47] used homogenous recurrence relation to propose a new efficient scheme that deals with the multi-secret hierarchical scheme.
This scheme has been proposed to overcome the shortcomings of the above-discussed schemes and incorporate the features in the following ways:
  • It supports the hierarchical access structures as discussed in the first paragraph of the current section. It improves and enhances the applicability of the hierarchical access structure.
  • It supports weighted threshold secret sharing as discussed in the second paragraph without any exponential operation and extra burden.
  • It supports secret sharing with multi-stage, multi-level properties with verification of shares lacking in schemes discussed in the third and fourth paragraphs.
  • In the last paragraph of this section, novel schemes is discussed. These schemes do not explain security features such as correctness and forward/backward secrecy.
    Proposed schemes provide essential security features such as fairness and correctness. At the same time, the proposed scheme’s computational cost and storage cost is much less.

3. Preliminaries/Foundations

This section describes some of the preliminaries required to design our scheme.

3.1. Shamir’s ( t , n ) Secret Sharing Scheme

In secret sharing principle objective is to partition the secret S into n pieces s 1 , s 2 , , s n such that:
  • Learning of t or more s i pieces makes S to be uniquely determined.
  • Learning of any t 1 or less s i pieces leaves S totally unpredictable.
This scheme depends on polynomial interpolation.The fundamental idea of Adi Shamir’s threshold scheme can be understand by a simple example:
  • At least 2 points are necessary to draw a line. (i.e, one point is not sufficient)
  • At least 3 points are necessary to draw a parabola (i.e, less than 3 points are not sufficient )
  • Similarly, it takes at least ’t’ points to draw a polynomial of degree ’ t 1 ’ (i.e, less than t points are not sufficient).
Following are the main phases of ( t , n ) threshold scheme, where n is total number of shareholders and t is minimum number of shareholders necessary to reconstruct the secret S. Distribution phase::
  • Select a prime number Q
  • Randomly select a function g ( x ) = b 0 + b 1 x + b 2 x 2 + + b t 1 x t 1
  • Compute (i, g(i)) corresponding to the i t h shareholder, i = 1 , 2 , , n .
  • These points (i, g(i)) are distributed securely to n share holder/participants
Reconstruction phase:
  • Compute Lagrange’s interpolating polynomial using t shares
    g ( x ) = i = 1 t g ( i ) j = 1 , j i t x x j x i x j m o d Q
  • In this way, we get the polynomial in the form
    g ( x ) = b 0 + b 1 x + b 2 x 2 + + b t 1 x t 1 ,
    where b 0 = S, is the secret.

3.2. Hierarchical Access Structure

Access Structure( Γ ) Recovery of secret is authorized for some group of people and it is unauthorized for another group of people. Those sets which are authorized is known as access structure. Adversary Structure( Γ ¯ ) The set of all non authorized sets that do not have any information related to the secret, is said to be an adversary structure.
In ( t , n ) threshold access structure any set of t or more participants out of n is said to be an authorized set and any set less than t in number is said to be non-authorized set. Let λ be the set of n participants. In Set builder form a ( t , n ) threshold access structure and the corresponding adversary structures are::
Γ = { X 2 λ : | X | t }
and
Γ ¯ = { X 2 λ : | X | < t }
respectively.
In 2006, Herranz et al. [22] explained importance of multipartite structure. According to Herranz “In multipartite structure the set of players is divided into K disjoint classes, and all players in each class play exactly the same role within the access structure. These access structures can make a lot of sense in real life applications, where persons or machines are divided into different groups according to their position in a company, their responsibilities, their computational resources or their probability of being corrupted by an attacker ”.
A multipartite access structure splits the set of participants in λ into m disjoint sets l 1 , l 2 , l m called levels and all participants in each level play exactly the same role inside the particular access structure.

3.3. Overview of YCH Scheme

Initialization phase
  • In this scheme following notations are used :
  • ( t , n ) - scheme. where t is for threshold and n is for number of participants.
  • B 1 , B 2 , , B k , denotes the k secrets to be shared.
  • n secret shadows s 0 , s 1 , s 2 , , s n are randomly chosen by the dealer and distributed to the participants through a secure channel.
  • A random value `r’ is chosen.
  • A 2-variable 1-way function h(r, s i ) , i = 1 , 2 , , n . is chosen.
Construction phase
  • k t ( Number of secrets are less than the threshold)
    (a)
    A prime number ’Q’ is chosen by the dealer.
    (b)
    The dealer choose a polynomial f ( x ) mod Q. Degree of polynomial is ( t 1 ) where,
    (c)
    B 1 , B 2 , , B k are the secrets to be shared and b 1 , b 2 , b 3 , b t k are random numbers.
    (d)
    f ( x ) = B 1 + B 2 x + , , + B k x k 1 + b 1 x k + b 2 x k + 1 + + b t k x t 1 m o d Q
    (e)
    For every i t h participant the dealer computes g i = f ( h ( r , s i ) ) mod Q
    (f)
    Publish ( r , g 1 , g 2 , , g n ) .
  • k > t (Number of secrets is greater than the threshold)
    (a)
    A prime number Q and a polynomial f ( x ) m o d Q is chosen by dealer. Degree of polynomial is ( k 1 ) . where B 1 , B 2 , , B k are the secrets.
    f ( x ) = B 1 + B 2 x + + B k x k 1 m o d Q
    (b)
    For i=1 to n. g i = f ( h ( r , s i ) ) m o d Q is computed.
    (c)
    For i = 1 t o n . f ( i ) m o d Q is computed
    (d)
    calculated values like r , g 1 , g 2 , , g n are publicly published.
    (e)
    f ( 1 ) , f ( 2 ) , , f ( k t ) are also published in public.
Recovery phase
In order to recover the secrets B 1 , B 2 , , B k ,
  • Each participant uses his/her share to compute h ( r , s i ) (for i=1 to t)
  • The polynomial f ( x ) is determined as follows:
  • k t ( Number of secrets are less than the threshold )
    f ( x ) = i = 1 t g i j = 1 , j i t x h ( r , s j ) h ( r , s i ) h ( r , s j ) m o d Q = B 1 + B 2 x + + B k x k 1 + a 1 x k + a 2 x k + 1 + + a t k x t 1 m o d Q .
  • for k > t (Number of secrets is greater than the threshold)
    f ( x ) = i = 1 k g i j = 1 , j i k x h ( r , s j ) h ( r , s i ) h ( r , s j ) + i = 1 k t f ( i ) j = 1 , j i k t x j i j m o d Q = B 1 + B 2 x + + B k x k 1 m o d Q .
  • from the above equations, we get the secrets
    B 1 , B 2 , , B k

3.4. 2- Variable 1- Way Function

Definition A 2-Variable,1-way function h ( r , s ) is a function that maps a random value r and a share s onto a bit string of fixed length.
Properties: 
It contains following properties:
  • when r and s, are given h ( r , s ) is easily computable. But for a givens and h ( r , s ) , it is very difficult to compute r.
  • It is hard to compute h ( r , s ) when there is no knowledge of s.
  • For the given s, it is hard to find two different values r 1 and r 2 that satisfy the situation h ( r 1 , s ) = h ( r 2 , s ) .
  • It is tough to compute s, for the given r and h ( r , s ) .
  • If we have pairs of r and h ( r , s ) , it is difficult to find h ( r , s ) = h ( r , s ) for which r r .

4. Identification of Problem and Motivation

In all the existing scheme, a separate polynomial is taken corresponding to each secret which results in overhead of public values and calculations. Verification in hierarchical system is included in papers like [3] with some limitations. In the present work, we try to reduce the limitations in the verification phase.

4.1. Contribution

In our work, we have proposed “multi-secret sharing scheme for hierarchical access structure ”using the YCH scheme. By using YCH scheme we get following advantages:
  • It permits parallel reconstruction of secrets.
  • Number of the secrets to be distributed can be dynamically determined.
  • This scheme is of multi-use. Furthermore, fewer public values, less storage, as well as computing time, are needed in our scheme.
By using 2-variables 1-way function we get the following advantages:
  • Any participant can identify the cheater whether he/she is the dealer or the participant.
  • There is no need of secure channel between the Dealer and the participant.
  • This scheme can also detect the invalid shares.

5. Proposed Scheme

5.1. Overview

All participants are classified into m levels. Each level has fixed ( t , n ) pair where t is the threshold out of n participants. Dealer chooses pseudo share s i l for the i t h participant at level l. Pseudo share is distributed through secure channel. B 1 , B 2 , , B k are the secrets. Using YCH scheme dealer computes actual share ( d i l ) for each participant. public share ( Z i l ) is calculated on addition of actual share in the 1-way function.
In the Reconstruction phase, the actual share of the participants is calculated by subtracting 1-way function from the public share. This actual share is used in the Lagrange interpolation polynomial and generates the polynomial having coefficients as secrets. If share’s number in a particular level is less than its threshold value then upper-level shareholder provides his share to reconstruct the secret.

5.2. Initialization

  • Number of participants is n.
  • Number of level is m.They are l 1 , l 2 , , l m .
  • Each level is associated with a ( t j , n j ) , j [ 1 , m ] access structure.
  • Dealer chooses n shares s i j , i [ 1 , n j ] , j [ 1 , m ] .

5.3. Distribution

At each level l there may be two situations:
  • Number of secrets k is less than the threshold
  • Number of secrets k is more than the threshold.
  • k t j ( number of secret is less than or equal to t j )
    (a)
    A prime number Q is chosen by the dealer.
    (b)
    The dealer construct polynomial f ( x ) mod Q. The degree of polynomial is ( t j 1 ). Let ,
    f ( x ) = B 1 + + B k x k 1 + b 1 x k + + b t k x t 1 m o d Q ,
    where B 1 , B 2 , , B k , are the secrets,
    (c)
    b 1 , b 2 , b 3 , , b t j k , j [ 1 , m ] are randomly chosen numbers.
    (d)
    For the i t h participant the dealer computes g i = f ( h ( r , s i ) ) m o d Q , i [ 1 , n ] .
    (e)
    Publish ( r , g 1 , g 2 , , g n ) .
  • k > t j ( Number of secrets is greater than t j .)
    (a)
    A prime number Q is chosen.
    (b)
    Dealer construct a polynomial f ( x ) m o d Q of degree ( t j 1 ) . Let
    f ( x ) = B 1 + B 2 x + + B k x k 1 m o d Q ,
    where B 1 , B 2 , , B k are the secrets.
    (c)
    For i = 1 , 2 , 3 , , n . g i = f ( h ( r , s i ) ) m o d Q is Computed.
    (d)
    For i = 1 t o n . f ( i ) m o d Q is Computed
    (e)
    calculated values like r , g 1 , g 2 , , g n are made public
    (f)
    f ( 1 ) , f ( 2 ) , , f ( k t ) are published in public.
For both the cases, dealer perform the following calculations:
1.
Calculate actual share ( d i l ) and pseudo share( Z i l ) for the i t h participant of level l using following formulas:
d i l = f ( I D i l ) a n d Z i l = d i l + g ( s i l )
where g is one-way function in which s i l denotes the share of i t h participant of level l
2.
Calculate actual share ( d i l u ) and pseudo share ( Z i l u ) of the i t h participant of upper level u using formula::
d i l u = f ( I D i l u ) a n d Z i l u = d i l u + g ( s i l u )
where I D i l u is the identifier for i t h element of u t h level.
3.
s i l and s i l u (if needed) is distributed to each participant using a secure channel.
4.
All Z i l r ,r values are published.

5.4. Reconstruction

Each participant compute actual share of other participants involved in the reconstruction by using formula
d i l = Z i l g ( s i l )
and then following two cases are considered
  • Case 1
Particular level have sufficient number of participant i.e greater or equal to threshold,then participant of same level exchange their pseudo share and use the following formula:
  • for k t
    h ( x ) = i = 1 n d i j = 1 , j i n x I D j I D i I D j m o d Q = B 1 + B 2 x + + B k x k 1 + a 1 x k + a 2 x k + 1 + + a t k x t 1 m o d Q .
  • for k > t
    h ( x ) = i = 1 n d i j = 1 , j i n x I D j I D i I D j + i = 1 k t f ( i ) j = 1 , j i k t x j i j m o d Q = B 1 + B 2 x + . . . . + B k x k 1 m o d Z
  • Case 2
Particular level have insufficient number of threshold, then the share of the upper level participant for this level is used in the above formula. Thus we get the secret B 1 , B 2 , B 3 , , B K .

5.5. Verification

Following steps are involved in verification phase:
  • Pseudo share s i l is distributed to participants securely by dealer.
  • Each i t h participant uses his actual share ( d i l ) in two variable one way function with random variable r. Let that two way variable function is q i ( r , d i l ) .
  • Calculated q i values made public.
  • Public share Z i l is also published.
    Now at the time of exchange of shares:
  • Each participant compute actual share of each participants
    d i l = Z i l g ( s i l ) .
  • Using that actual share , q i ( r , d i l ) is calculated for i t h participant.
  • If q i ( r , d i l ) is equal to already public value of q i then participant share is valid otherwise the actual share of participant is not valid.
  • In a similar way, an individual participant will be able to check the legitimacy of his/her share given by the dealer.

5.6. Example

We can understand proposed scheme more clearly by following example with small parameters.Let us consider the hierarchical system with two levels l 1 and l 2 . Upper level is l 1 and lower is l 2 . Dealer has two secrets, i.e., B 1 = 2 and B 2 = 3 . Identifiers I D 1 l 1 = 1 , I D 2 l 1 = 2 , I D 3 l 1 = 3 for the level l 1 and I D 1 l 2 = 4 , I D 2 l 2 = 5 , I D 3 l 2 = 6 for the level l 2 .
Dealer chooses shares s 1 1 = 10 , s 2 1 = 11 , s 3 1 = 12 for the level-1 and s 1 2 = 13 , s 2 2 = 14 , s 3 2 = 15 for the level-2.

5.6.1. Distribution

For the sake of easiness in calculation, we perform calculations on 2nd level.
h ( x ) = 2 + 3 x + 4 x 2 m o d 23
calculate actual share for the i t h participants for the level-2 by using formula: d i l r = h( I D i l r ) are
d 1 l 2 = 9 , d 2 l 1 = 2 , d 3 l 1 = 3
Actual share of i t h participants of upper level for the level-2
d 1 l 2 , 1 = h ( I D 1 l 1 ) = 9 .
Similarly, we obtain d 2 l 2 , 1 = 1 and d 3 l 2 , 1 = 1
Choose one-way function g = 2 s i l r mod 23.
Compute pseudo share of the i t h participants of the level R.
Z i l r = d i l r + g ( s i l r ) .
Therefore, we get Z 1 l 2 = 13, Z 2 l 2 = 10, Z 3 l 2 = 19.
Similarly, pseudo share of the participants of upper level for the level-2 are
Z 1 l 2 , 1 = 21 , Z 2 l 2 , 1 = 2 , Z 3 l 2 , 1 = 3
Publish all pseudo share and distribute S i l r to every participants through secure channel.
Table 1. Comparison in tabular form.
Table 1. Comparison in tabular form.
Preprints 107883 i001

5.6.2. Reconstruction

In reconstruction phase each participant has pseuodoshare and the share s i l r for the particular level actual share is computed by using
d i l r = Z i l r - g ( s i l r ) .
Hence, we have
d 1 l 2 = 9 , d 2 l 2 = 2 , d 3 l 2 = 16
Similarly, actual share of the upper level participants for level-2 is as follows:
d 1 l 2 = 9 , d 2 l 2 = 1 , d 3 l 2 = 1
Now, there is possibility of two case:
  • Particular level (here level-2) has sufficient number of participants
  • Particular level has less no of participants then upper level participant takes part in reconstruction of secret.
Case-1
h ( x ) = i = 1 t d i l j = 1 , j i t x I D j I D i I D j m o d Q = B 1 + B 2 x + . . + B k x k 1 + a 1 i x k + a 2 i x k + 1 + a t k i x t 1 m o d Q = 9 * ( x 5 ) ( x 6 ) ( 4 5 ) ( 4 6 ) + 2 * ( x 4 ) ( x 6 ) ( 5 4 ) ( 5 6 ) + 3 * ( x 4 ) ( x 5 ) ( 6 4 ) ( 6 5 ) .
That is,
h ( x ) = 2 + 3 X + 4 X 2 .   So   the   secrets   are   2 ,   and   3
Case-2 No. of participants in level-2 is one less than the threshold. Therefore, one of upper level participants takes part in reconstruction. Hence, the pair of (ID,actual share) are::(4,9)(5,2)(1,9) applying same formula as in the Case-1.
h ( x ) = 9 * ( x 5 ) ( x 1 ) ( 4 5 ) ( 4 1 ) + 2 * ( x 4 ) ( x 1 ) ( 5 4 ) ( 5 1 ) + 3 * ( x 4 ) ( x 5 ) ( 1 4 ) ( 1 5 )
h ( x ) = 2 + 3 x + 4 x 2 . Thus, the secrets are 2 and 3.

6. Security and Performance Analysis

While choosing a scheme, we must be clear about the capabilities of adversary along with the explanation of security properties it supports. There must be an strong analysis about computational and communication cost. In this section, we have explained all these concepts in details.

6.1. Adversary Model

There must be an adversary model against which the scheme is safe. The most common adversarial model for analyzing security protocols was presented by Dolev and Yao [14] in 1983. Apart from this, we have considered two types of adversaries:
  • Insider Adversary, These are legitimate shareholders who acquired shares from the dealer.
  • Outsider Adversary, The external adversary is an attacker who does not own any of the dealer’s shares but may try to gain unauthorized access.
    In general, a dealer is considered as trustworthy as in [3], but here we have considered the worst situation that the dealer is committing fraud by providing fake shares to the participants.

6.2. Security analysis

Any scheme must pass through formal and Informal analysis to verify its applicability in current scenario. In proposed scheme, We have used Random Oracle Modal (RoM) for formal analysis. In informal analysis we have proved our scheme safe from several attacks.

6.2.1. Formal Security Analysis (Random Oracle Model)

A cryptographic hash function H is treated as a really random function by the random-oracle model. The random-oracle model more particularly hypothesises the existence of a public, random function H that can only be evaluated by "querying" an oracle, which can be thought of as a "black box," that returns H ( x ) when given input x. A formal approach that can be used to create and verify cryptographic methods is provided by the random-oracle model. In 2014, Herranz et al. [23] provided the formal definition of security for MSS in the random oracle model. Moreover, they proposed an MSS formally proved its computational security in ROM. As far as we know, that is an MSS’s first formal security analysis. Security analysis of multi secret sharing scheme has been performed by [31]. In this section, we prove the computational security of the proposed scheme Ω assuming that the hash function H behaves as a random oracle.
Before we proceed with the proof, the following are the assumptions:
  • We assume the proposed scheme as the set of tuples, Ω = I n t , d i s t , R e c where Int stands for Intilization/setup phase, dist stands for distribution and Rec is for recovery phase.
  • PP(Public parameters)= ( p , H , ρ , t
    • p : prime number p > n such that p is at least λ bits long
    • H : a hash function, H : Z p * Z
    • ρ : Set of participants
    • t: threshold
  • There is an adversary A 1 contains set of participants ρ and threshold value t.
Theorem For an adversary λ , we have
p r G M S A 1 S A ( λ ) = 1 1 2 q H n λ λ + 2 + 0 ( q H n 2 2 λ + 1 )
here adversary makes at most q H queries to the random oracle for H against the GMS and Ω .
Proof For proof we follow the following steps:
Step1 We act as the challenger of the security game G 1 described in [31].
Step2 We pass public parameters to the initialization algorithm and send the result to the adversary.
Step3 A 1 broadcast B ϵ ρ , we choose s h i ϵ Z p , p i ϵ ρ
Step4 after masking hash query x to the random oracle H, if x ϵ s h i p i ϵ B then abort the game, otherwise proceed for the next step.
Step4 a random value is k ϵ Z p is chosen and send to adversary. At the same time, ( x , k ) is saved in the table.
Step4 Two global secrets
S 0 = ( s 1 0 , s 2 0 , , s l 0 )
( s 1 1 , s 1 2 , , s l 1 ) = S 1
are broadcasted by adversary A 1 .
Step5 We choose a random value r ϵ Z p * such that r s h i for P i ϵ ρ and adversary doesn’t query r , 2 r , , l r to the random oracle H.
Step6 a random polynomial f ( x ) is chosen where, f ( 0 ) = r and compute h i = H ( s h i ) and r i = f ( i ) h i m o d p and again store ( s h i , h i ) in the hash table. Similarly choose l no. of random values ( k 1 , , k l ) ϵ Z p and store ( r , k 1 ) , ( 2 r , k 2 ) , , ( l r , k l ) in the hash table.
Step7 Choose a random bit b ϵ 0 , 1 and compute y j = k j s b j m o d p 1 j l and give shares of corrupted players ( i , s h i ) p i ϵ B . along with this public output O u t p u b = r 1 , r 2 , , r n , y 1 , , y l are also shared.
Step8 after continuous query to H ( . ) , adversary A 1 , outputs a bit b which is defined in the following equation
o / p = 1 , if b = b 0 , if b b
from above steps, we conclude that A 1 is not allowed to query s h i such that p i ϵ B and 1 j l .

6.2.2. Informal Security Analysis

Any proposed protocol must be passed through the following goals:
  • Correctness : In verification phase Each participant compute actual share of other participants d i l = Z i l g ( s i l ) using that actual share , q i ( r , d i l ) is calculated for i t h participant. If q i ( r , d i l ) is equal to already public value of q i then participant share is valid otherwise the actual share of participant is not valid.
  • Forward secrecy: keys like q i ( r , d i l ) can only be computed or stored by members of the closed communication group; if a member leaves the group, the departing member will be unable to access the content of future conversations.
  • perfectness: We use Shamir’s (t, n) secret sharing scheme for share distribution at each level in the proposed scheme. It is well known that fewer than t participants in Shamir’s (t, n) secret sharing scheme cannot reconstruct the secret. Hence, our scheme is also perfect.
  • Fairness of secret sharing One desirable quality in secret sharing is Fairness, which indicates that if one member obtains the secret, the other participants are not harmed. Halpern and Teague [16] were the first to offer rational cryptographic protocols in 2004. They pointed out that any method for reassembling secrets with a well-known upper constraint on the running duration is unstable and that parties will not submit anything in the final round since they have no reason to do so because the other participant does. Regrettably, earlier secret-sharing systems necessitated numerous rounds with high overheads. Zhang et al. [48,49] explain the scheme’s. Fairness but leave out the access mechanism. To summarise, existing fairness schemes necessitate a trusted third party or many rounds of communication. The proposed scheme provides Fairness without the dependency on a third party and extra overheads in communication.
  • Freshness of keys: In the proposed scheme, all the exchangeable values depend upon the random bi-variate polynomial. It makes pseudo share, and shares are always fresh. Hence, it is impossible to impersonate a member by recording a previously used key.
  • Eavesdropping attack In proposed scheme, each i t h participant uses his actual share ( d i l ) in two variable one way function with random variable r which makes it independent of public parameters. Therefore, an adversary will not be able to know any secret information from communication parameters. So, the proposed scheme is safe from eavesdropping activities.
  • Cheating identification In the proposed scheme, an individual participant can check the legitimacy of his/her share given by the dealer. Thus, the proposed scheme provides cheating identification.
  • Verifiability In the reconstruction phase, participants can verify shares received from other participants and dealers. On the other hand, a dealer can also verify the participant’s shares. Thus, the proposed scheme provides verifiability.
  • Unconditional security While exploring the security analysis, both types of adversaries are considered with their capacity to the full extent. It implies that no assumptions are made about an adversary’s computing power and resources.

6.3. Performance analysis

6.3.1. Computational cost

In the proposed scheme, each member must compute pairwise shared keys with others in the verification phase. According to Horner’s rule [27], t and h computations are required for each univariate polynomial of t 1 and h 1 degree. In the proposed protocol, calculation reduces to Shamir’s secret sharing scheme. According to [38] computational time for 8 person is 0.0039 second. There is a slight change in computation time as we increase the number of persons, Basit et al. [4] uses extra polynomial, and Tentu et al.[41] uses modular exponentiation, which increases computational cost. The computational cost for the same no. of persons are 0.2439 second and 80.003 second of [4] and [41] respectively. Similarly, computational cost for 8 persons in [49] is 0.23 second. So we conclude that the computation cost is meager compared to the other existing schemes. For more clarity, we have presented a graphical comparison of schemes in terms of computational time and security features it supports in Figure 1.

6.3.2. Storage Cost

Each member has to store only uni-variate polynomial of modulus P . So the storage requirement for each member is t log P bits. This polynomial-based modulus is far less than the public-key-based modulus [45]. Here threshold is t. To get collusion-free authentication, each member must simultaneously deal with t + 1 univariate polynomial. So overall storage cost is significantly less compared to symmetric key-based schemes.

7. Comparison with Existing Scheme

The proposed scheme uses the YCH scheme, while all other schemes for hierarchical access structures use simply shamir’s scheme. In the proposed scheme “Multiple-secrets ”are shared among a group of people for different levels. Our scheme provides a mechanism for verifying the shares, which is also new for hierarchical access structures. This is more efficient than other schemes. Basit et al. [4] used Shamir’s scheme with the successive application of one-way function and shift key technique to propose Multi-stage, Multi-secret sharing for hierarchical Access Structure. Apart from the above papers, the Hierarchical secret sharing (HSSS)scheme is discussed in [3,5,28] but his scheme lacks fairness. Banerjee et al. [3] proposed Cheating detection and cheater Identification for hierarchical structure but lacks correctness. Bisht et al. [5] proposed work on multi-level secret sharing but lacks fairness and perfectness. Similarly, Yuan et al. [46] used homogenous recurrence relation to propose a new efficient scheme that deals with a multi-secret hierarchical scheme. It is a novel work but lacks explanation about correctness and forward/backward secrecy Our scheme also avoids the problem of Chen et al. scheme’s [11] which requires checking the non-singularity of multiple matrices. Furthermore, during the entire scheme, each participant keeps only one share, which is as long as the secret, indicating that our method is optimum. Furthermore, despite requiring more public values, our scheme can simultaneously disclose many secrets. In Table 1, we can see the importance of the present scheme in comparison with other schemes.
In our proposed scheme, we have used a one-way function, which restricts the outsider Adversary from stealing or breaching information about the secret. To deal with the situation of Case-1 and Case-2,Two variable one-way functions are used. Using a two-variable one-way function, every participant can verify the share received from the dealer and other participants. Our scheme also satisfies the security goals like correctness and secrecy. In Table I, we have compared the recent scheme for multi-secret sharing. From there, we conclude that our scheme can provide many security properties in the case of IoT authentication. Furthermore, in Figure 1, we can see that computational is significantly less than others and security features are more in numbers supported by proposed scheme.

8. Conclusions

In the present work, we categorized participants into different levels with varying thresholds, aligning with a hierarchical structure. Subsequently, we proposed a hierarchical multi-secret sharing scheme based on the YCH scheme. The YCH scheme is highly efficient, and the inclusion of a one-way function enhances its security, making it unconditionally secure. The reusability of shares eliminates the need for frequent refreshment of shares for future communication. In addition to being reusable, multi-secret, and hierarchical, our scheme includes a valuable feature: the verification of shares. Specific participants can verify the shares they receive from other participants or the dealer. This verification feature makes our proposed scheme particularly useful for robust security solutions. Comparisons with existing schemes demonstrate its superiority in preserving security. Our scheme not only improves operational efficiency but also provides a scalable solution adaptable to various access structures. Future work could explore further optimizations and applications in complex, multi-stage security environments.

Author Contributions

All authors made equal contributions.

Funding

Applicable.

Data Availability Statement

Data sharing is not applicable as no datasets were generated or analyzed during the current study.

Acknowledgments

We are very thankful to the "SageMath" open source community. This paper has been executed utilizing free open source arithmetic programming in SageMath [37]. The authors extend their appreciation to Princess Nourah Bint Abdulrahman University (PNU), Riyadh, Saudi Arabia for funding this research under Researchers Supporting Project Number (PNURSP2024R231).

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Asmuth C. and Bloom J., “A modular approach to key safeguarding,” IEEE transactions on information theory, vol. 29, no. 2, pp. 208–210, 1983.
  2. Ballico1 E., Boato G., Fontanari C., and Granelli F., “Hierarchical secret sharing in ad hoc networks through birkhoff interpolation,” in Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005, EIAE 2005, pp. 157–164, Springer, 2006.
  3. Banerjee S., Gupta D. S., and Biswas G., “Hierarchy-based cheating detection and cheater identification in secret sharing schemes,” in 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1–6, IEEE, 2018.
  4. Basit A., Kumar N. C., Venkaiah V. C., Moiz S. A., Tentu A. N., and Naik W., “Multi-stage multi-secret sharing scheme for hierarchical access structure,” in 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 557–563, IEEE, 2017.
  5. Bisht K. and Deshmukh M., “A novel approach for multilevel multi-secret image sharing scheme,” The Journal of Supercomputing, vol. 77, no. 10, pp. 12157–12191, 2021.
  6. Blakley G. R., “Safeguarding cryptographic keys,” in Managing requirements knowledge, international workshop on, pp. 313–313, IEEE Computer Society, 1979.
  7. Blundo C., De Santis A., Stinson D. R., and Vaccaro U., “Graph decompositions and secret sharing schemes,” Journal of cryptology, vol. 8, no. 1, pp. 39–64, 1995.
  8. Brickell E. F., “Some ideal secret sharing schemes,” in Workshop on the Theory and Application of of Cryptographic Techniques, pp. 468–475, Springer, 1989.
  9. Bufalo M., Bufalo D., and Orlando G., “Some properties of the computation of the modular inverse with applications in cryptography,” Computation, vol. 11, no. 4, p. 70, 2023.
  10. Chanu O. B., Tentu A. N., and Venkaiah V. C., “Multi-stage multi-secret sharing schemes based on chinese remainder theorem,” in Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), pp. 1–6, 2015.
  11. Chen Q., Tang C., and Lin Z., “Efficient explicit constructions of multipartite secret sharing schemes,” IEEE Transactions on Information Theory, vol. 68, no. 1, pp. 601–631, 2021.
  12. Chen H.-Y., Wu Z.-Y., Chen T.-L., Huang Y.-M., and Liu C.-H., “Security privacy and policy for cryptographic based electronic medical information system,” Sensors, vol. 21, no. 3, p. 713, 2021.
  13. Choc B., Goldwasser S., Micali S., and Awerbuch B., “Verifiable secret sharing and achieving simultaneity in the presence of faults.,” in Annual Symposium on Foundations of Computer Science (Proceedings), pp. 383–395, 1985.
  14. Dolev D. and Yao A., “On the security of public key protocols,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208, 1983.
  15. Gutte V. S. and Parasar D., “Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing,” International Journal of Intelligent Systems, vol. 37, no. 7, pp. 4190–4213, 2022.
  16. Halpern J. and Teague V., “Rational secret sharing and multiparty computation,” in Proceedings of the thirtysixth annual ACM symposium on Theory of computing, pp. 623–632, 2004.
  17. Harn L. and Hsu C.-F., “(t, n) multi-secret sharing scheme based on bivariate polynomial,” Wireless Personal Communications, vol. 95, pp. 1495–1504, 2017.
  18. Harn L., Hsu C.-F., Xia Z., Zhou J., et al., “How to share secret efficiently over networks,” Security and Communication Networks, vol. 2017, 2017.
  19. Hazzazi M. M., Attuluri S., Bassfar Z., and Joshi K., “A novel cipher-based data encryption with galois field theory,” Sensors, vol. 23, no. 6, p. 3287, 2023.
  20. He J. and Dawson E., “Multistage secret sharing based on one-way function,” Electronics Letters, vol. 30, no. 19, pp. 1591–1592, 1994.
  21. He J. and Dawson E., “Multisecret-sharing scheme based on one-way function,” Electronics Letters, vol. 31, no. 2, pp. 93–95, 1995.
  22. Herranz J. and Sáez G., “New results on multipartite access structures,” IEE Proceedings-Information Security, vol. 153, no. 4, pp. 153–162, 2006.
  23. Herranz J., Ruiz A., and Sáez G., “New results and applications for multi-secret sharing schemes,” Designs, codes and cryptography, vol. 73, pp. 841–864, 2014.
  24. Hernández-Álvarez L., Bullón Pérez J. J., Batista F. K., and Queiruga-Dios A., “Security threats and cryptographic protocols for medical wearables,” Mathematics, vol. 10, no. 6, p. 886, 2022.
  25. Hung-Yu C., Jinn-Ke J., and Yuh-Min T., “A practical (t, n) multi-secret sharing scheme,” IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. 83, no. 12, pp. 2762–2765, 2000.
  26. Jara-Vera V. and Sánchez-Ávila C., “Some notes on a formal algebraic structure of cryptology,” Mathematics, vol. 9, no. 18, p. 2183, 2021.
  27. Knuth D. E., The art of computer programming. Pearson Education, 2005.
  28. Lin C., Harn L., and Yea D., “Ideal hierarchical (t, n) secret sharing schemes,” in Proceedings of the Fifth International Conference on Information Assurance and Security (IAS09), Xian, China, Citeseer, 2009.
  29. Liu Y., Zhang F., and Zhang J., “Attacks to some verifiable multi-secret sharing schemes and two improved schemes,” Information Sciences, vol. 329, pp. 524–539, 2016.
  30. Ma C. and Cheng R., “Key management based on hierarchical secret sharing in ad-hoc networks,” in Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31-September 5, 2007, Revised Selected Papers 3, pp. 182–191, Springer, 2008.
  31. Mashhadi S., “Toward a formal proof for multi-secret sharing in the random oracle model,” Information Security Journal: A Global Perspective, vol. 29, no. 5, pp. 244–249, 2020.
  32. Masood F., Ahmad J., Shah S. A., Jamal S. S., and Hussain I., “A novel hybrid secure image encryption based on julia set of fractals and 3d lorenz chaotic map,” Entropy, vol. 22, no. 3, p. 274, 2020.
  33. Padró C. and Sáez G., “Secret sharing schemes with bipartite access structure,” IEEE Transactions on Information Theory, vol. 46, no. 7, pp. 2596–2604, 2000.
  34. Rauf A., Wang Z., Sajid H., and Ali Tahir M., “Secure route-obfuscation mechanism with information-theoretic security for internet of things,” Sensors, vol. 20, no. 15, p. 4221, 2020.
  35. Ren P., Li F., Wang, Y., Zhou, H., and Liu P., “Ipsadas: identity-privacy-aware secure and anonymous data aggregation scheme,” International Journal of Intelligent Systems, vol. 37, no. 8, pp. 5290–5324, 2022.
  36. Richter M., Bertram M., Seidensticker J., and Tschache A., “A mathematical perspective on post-quantum cryptography,” Mathematics, vol. 10, no. 15, p. 2579, 2022.
  37. SageMath, “Use SageMath Online — cocalc.com.” https://cocalc.com/features/sage. [Accessed 30-04-2024].
  38. Security and So Many Things — asecuritysite.com. https://asecuritysite.com/. [Accessed 30-04-2024].
  39. Shamir A., “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
  40. Simmons G. J., “How to (really) share a secret,” in Conference on the Theory and Application of Cryptography, pp. 390–448, Springer, 1988.
  41. Tentu A. N., Bhavani K., Basit A., and Venkaiah V. C., “Sequential (t, n) multi secret sharing scheme for level-ordered access structure,” International Journal of Information Technology, vol. 13, pp. 2265–2275, 2021.
  42. Tito-Corrioso O., Borges-Quintana M., Borges-Trenard M. A., Rojas O., and Sosa-Gómez G., “On the fitness functions involved in genetic algorithms and the cryptanalysis of block ciphers,” Entropy, vol. 25, no. 2, p. 261, 2023.
  43. Tompa M. and Woll H., “How to share a secret with cheaters,” journal of Cryptology, vol. 1, no. 3, pp. 133–138, 1989.
  44. Wang X., Zhang X., Zu C., Yang, Z., Bian G., Zhang, Y., Ruan, W., Wu B., Wu X., Yuan, L., et al., “An accurate cloud-based indoor localization system with low latency,” International Journal of Intelligent Systems, vol. 37, no. 8, pp. 4794–4809, 2022.
  45. Wu S., Hsu C., Xia Z., Zhang J., and Wu D., “Symmetric-bivariate-polynomial-based lightweight authenticated group key agreement for industrial internet of things,” Journal of Internet Technology, vol. 21, no. 7, pp. 1969–1979, 2020.
  46. Yang C.-C., Chang T.-Y., and Hwang M.-S., “A (t, n) multi-secret sharing scheme,” Applied Mathematics and Computation, vol. 151, no. 2, pp. 483–490, 2004.
  47. Yuan J., Yang J., Wang C., Jia X., Fu F.-W., and Xu G., “A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations,” Information Sciences, vol. 592, pp. 36–49, 2022.
  48. Zhang E., Li M., Yiu S.-M., Du J., Zhu J.-Z., and Jin G.-G., “Fair hierarchical secret sharing scheme based on smart contract,” Information Sciences, vol. 546, pp. 166–176, 2021.
  49. Zhang Y., Liu Z., and Huang G., “Sure interpolation and its application to hierarchical threshold secret sharing scheme,” in 2008 International Symposium on Computer Science and Computational Technology, vol. 1, pp. 447–450, IEEE, 2008.
Figure 1. Comparison of computational cost and security features supported
Figure 1. Comparison of computational cost and security features supported
Preprints 107883 g001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated