Unconditionally secure social secret sharing scheme

Unconditionally secure social secret sharing scheme

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The authors introduce the notion of a ‘social secret sharing scheme’, in which shares are allocated based on a player's reputation and the way he/she interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme while corrupted players are disenrolled immediately. In other words, this scheme proactively renews shares at each cycle without changing the secret, and allows trusted participants to gain more authority. The motivation is that, in real-world applications, components of a secure scheme may have different levels of importance (i.e. the number of shares a player has) as well as reputation (i.e. cooperation with other players for the share renewal or secret recovery). Therefore a good construction should balance these two factors, respectively. In the proposed schemes, both the passive and active mobile adversaries are considered in an unconditionally secure setting.


    1. 1)
      • Du, W., Atallah, M.J.: `Secure multi-party computation problems and their applications: a review and open problems', Proc. Workshop on New Security Paradigms, NSPW'01, 2001, p. 13–22.
    2. 2)
      • A. Shamir . How to share a secret. Commun. ACM , 11 , 612 - 613
    3. 3)
      • Blakley, G.R.: `Safeguarding cryptographic keys', National Computer Conference, 1979, New York, Montvale, NJ, USA, p. 313–317, vol. 48 of AFIPS Conf. Proc..
    4. 4)
      • Goldwasser, S.: `Multi party computations: past and present', Proc. 16th Ann. ACM Symp. on Principles of Distributed Computing, PODC'97, 1997, p. 1–6.
    5. 5)
      • D. Boneh , M. Franklin . Efficient generation of shared rsa keys. J. ACM , 4 , 702 - 722
    6. 6)
      • Harkavy, M., Tygar, J.D., Kikuchi, H.: `Electronic auctions with private bids', Proc. Third Conf. on USENIX Workshop on Electronic Commerce, WOEC'98, 1998, p. 61–74.
    7. 7)
      • C. Blundo , A. Cresti , A.D. Santis , U. Vaccaro . Fully dynamic secret sharing schemes. Theoret. Comput. Sci. , 2 , 407 - 440
    8. 8)
      • Y. Zhang , Z. Liu . Dynamic and verifiable secret sharing among weighted participants. J. Syst. Sci. Complexity , 4 , 481 - 485
    9. 9)
      • C. Tartary , H. Wang , H. Lipmaa , M. Yung , D. (Eds.) Lin . (2006) Dynamic threshold and cheater resistance for shamir secret sharing scheme’, Inscrypt.
    10. 10)
      • Nojoumian, M., Lethbridge, T.: `A new approach for the trust calculation in social networks', E-business and Telecommunication Networks: Third Int. Conf. on E-Business, Selected Papers, 2008, 9, p. 64–77.
    11. 11)
      • D.R. Stinson , R. Wei , H.M. Heys , C.M. (Eds.) Adams . (1999) Unconditionally secure proactive secret sharing scheme with combinatorial structures’, Selected areas in cryptography.
    12. 12)
      • D'Arco, P., Stinson, D.R.: `On unconditionally secure robust distributed key distribution centers', Proc. Advances in Cryptology, ASIACRYPT'02, 2002, p. 346–363, (LNCS).
    13. 13)
      • Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: `Verifiable secret sharing and achieving simultaneity in the presence of faults', FOCS, 1985, p. 383–395.
    14. 14)
      • Ben-Or, M., Goldwasser, S., Wigderson, A.: `Completeness theorems for non-cryptographic fault-tolerant distributed computation', STOC, 1988, p. 1–10.
    15. 15)
      • Rabin, T., Ben-Or, M.: `Verifiable secret sharing and multiparty protocols with honest majority', STOC, 1989, p. 73–85.
    16. 16)
      • Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: `Proactive secret sharing or: How to cope with perpetual leakage', CRYPTO, 1995, p. 339–352, (LNCS, 963).
    17. 17)
      • Ostrovsky, R., Yung, M.: `How to withstand mobile virus attacks (extended abstract)', Proc. 10th Ann. ACM Symp. on Principles of Distributed Computing, PODC'91, 1991, p. 51–59.
    18. 18)
      • Benaloh, J.C., Leichter, J.: `Generalized secret sharing and monotone functions', CRYPTO, 1988, p. 27–35, (LNCS, 403).
    19. 19)
      • Mui, L., Mohtashemi, M., Halberstadt, A.: `A computational model of trust and reputation for e-businesses', HICSS, 2002, p. 2431–2439.
    20. 20)
      • A. Jøsang , R. Ismail , C. Boyd . A survey of trust and reputation systems for online service provision. Decis. Support Syst. , 2 , 618 - 644
    21. 21)
      • B. Yu , M.P. Singh , M. Klusch , L. (Eds.) Kerschberg . (2000) A social mechanism of reputation management in electronic communities’in, CIA.
    22. 22)
      • Saxena, N., Tsudik, G., Yi, J.H.: `Efficient node admission for short-lived mobile ad hoc networks', Proc. 13th IEEE Int. Conf. on Network Protocols, 2005, p. 269–278.
    23. 23)
      • D.R. Stinson . (1995) Cryptography: theory and practice.
    24. 24)
      • R.S. Rees , D.R. Stinson , R. Wei , G.H.J. van Rees . An application of covering designs: determining the maximum consistent set of shares in a threshold scheme. Ars. Comb. , 225 - 237

Related content

This is a required field
Please enter a valid email address