Skip to main content

Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation

  • Conference paper
  • First Online:
Recent Advances in Information and Communication Technology 2018 (IC2IT 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 769))

Included in the following conference series:

  • 583 Accesses

Abstract

Despite the information theoretic security of Shamir Secret Sharing Scheme and the ideality of Verifiable Secret Sharing Scheme in ensuring the honesty of a dealer of the shared secret and the shared secret itself, the detection and removal of an adversary posing as shareholder is still an open problem due to the fact that most of the studies are computationally and communicationally complex. This paper proposes a verifiable secret sharing scheme using a simple subset sum theory in monitoring and removing compromised shareholder in a secure multiparty computation. An analysis shows that the scheme cost minimal computational complexity of O(n) on the worst-case scenario and a variable-length communication cost depending on the length of the subset and the value of n.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thomas, G., Sibi, L., Maneesh, P.: A novel mathematical model for group communication with trusted key generation and distribution using shamir’s secret key and USB security. In: International Conference Communication and Signal Processing, pp. 435–438 (2015)

    Google Scholar 

  2. Alwen, J., Hirt, M., Maurer, U., Patra, A., Raykov, P.: Anonymous authentication with shared secrets. In: Aranha, D., Menezes, A. (eds.) Progress in Cryptology - LATINCRYPT 2014. LNCS, vol 8895, pp. 219–236. Springer, Cham (2015)

    Google Scholar 

  3. Van Ruitenbeek, E., Keefe, K., Sanders, W.H., Muehrcke, C.: Characterizing the behavior of cyber adversaries: the means, motive, and opportunity of cyberattacks. In: Networks, pp. 17–18 (2010)

    Google Scholar 

  4. Tavakolifard, M., Almeroth, K.C.: Trust 2.0: Who to believe in the flood of online data? In: Proceedings of International Conference Computer Network Communication, pp. 544–550 (2012)

    Google Scholar 

  5. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427–437 (1987)

    Google Scholar 

  6. Backes, M., Kate, A., Patra, A.: Computational verifiable secret sharing revisited. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). LNCS, vol. 7073, pp. 590–609 (2011)

    Google Scholar 

  7. Harn, L., Lin, C., Li, Y.: Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 23, 1–7 (2015)

    Google Scholar 

  8. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: 26th Annual Symposium Foundations of Computer Science, pp. 21–23. IEEE, Portland (1985)

    Google Scholar 

  9. Nimmy, K.: Novel multi-server authentication protocol using secret sharing. In: International Conference on Data Mining and Advance Computing, pp. 1–6. IEEE, Ernakulam (2016)

    Google Scholar 

  10. Shukla, S., Sadashivappa, G.: Secure multi-party computation protocol using asymmetric encryption. In: 10th Asia Conference Information Security, pp. 780–785. IEEE, New Delhi (2014)

    Google Scholar 

  11. Wei, L., Ai, J., Liu, S.: A tightly secure multi-party-signature protocol in the plain model. In: 8th International Conference Biomedicine, Engineering and Informatics, pp. 672–677. IEEE, Shenyang (2016)

    Google Scholar 

  12. Pakniat, N., Noroozi, M., Eslami, Z.: Reducing multi-secret sharing problem to sharing a single secret based on cellular automata. IACR Cryptology ePrint Archive 642 (2017)

    Google Scholar 

  13. Aljumah, F., Soeanu, A., Liu, W.M., Debbabi, M.: Protocols for secure multi-party private function evaluation. In: 2015 1st International Conference Anti-Cybercrime, pp. 1–6. IEEE, Riyadh (2015)

    Google Scholar 

  14. Movatadid, L.: CSC 373 - algorithm design, analysis, and complexity - subset sum. In: Summer 2016, pp. 2–5 (2005)

    Google Scholar 

  15. Ren, S.Q., Meng, T.H., Yibin, N., Aung, K.M.M.: Privacy-preserved multi-party data merging with secure equality evaluation. In: Proceedings of International Conference Cloud Computing Research and Innovation, ICCCRI 2016, pp. 34–41 (2016)

    Google Scholar 

  16. Marwan, M., Kartit, A., Ouahmane, H.: Applying Secure multi-party computation to improve collaboration in healthcare cloud. In: International Conference System Collab, pp. 1–6. IEEE, Casablanca (2016)

    Google Scholar 

  17. Chen, K.: Efficient sum-to-one subsets algorithm for logic optimization. In: 29th ACM/IEEE Design Automation Conference, pp. 443–448. IEEE, CA (1992)

    Google Scholar 

  18. Zhou, D., Song, W., Ju, P.: Subset-sum based relay selection for multipath TCP in cooperative LTE networks. In: Globecom 2013 - Wireless Network Symposium Subset-Sum, pp. 4735–4740. IEEE, GA (2013)

    Google Scholar 

  19. Ristovski, Z., Mishkovski, I., Gramatikov, S., Filiposka, S.: Parallel implementation of the modified subset sum problem in CUDA. In: 22nd Telecommunication Forum Telfor, pp. 923–926. IEEE, Belgrade (2014)

    Google Scholar 

Download references

Acknowledgment

The researchers would like to acknowledge the financial support provided by the Commission on Higher Education K to 12 Transition Program PMU, Quezon City, Philippines and San Carlos College, San Carlos City, Pangasinan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Romulo L. Olalia Jr. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olalia, R.L., Sison, A.M., Medina, R.P. (2019). Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation. In: Unger, H., Sodsee, S., Meesad, P. (eds) Recent Advances in Information and Communication Technology 2018. IC2IT 2018. Advances in Intelligent Systems and Computing, vol 769. Springer, Cham. https://doi.org/10.1007/978-3-319-93692-5_21

Download citation

Publish with us

Policies and ethics