Received: 15 October 2016 Revised: 4 June 2017 Accepted: 16 July 2017
DOI: 10.1002/dac.3399
RESEARCH ARTICLE
Efficient multisecret sharing scheme using new proposed
computational security model
Reza Ghasemi
1
Ali Safi
2
Massoud Hadian Dehkordi
2
1
Bu-Ali Sina University, Hamedan, Iran
2
Iran University of Science and
Technology, Tehran, Iran
Correspondence
Massoud Hadian Dehkordi, Iran
University of Science and Technology,
Tehran, Iran.
Email: mhadian@iust.ac.ir
Summary
A multisecret sharing (MSS) is a method for sharing a set of secrets among
some participants. They can recover each of these secrets without endangering
the other secrets. Two kinds of security models have been proposed for MSS
schemes. These models are categorized into 2 types. The first security model is
unconditional security. This approach decreases the efficiency of MSS schemes.
Therefore, the second type of security, which is more relaxed, appeared. This
approach is called computational security. In this paper, with 2 examples, we will
show that the current definition of computational security does not satisfy all of
our expectations from a secure MSS scheme. In fact, in these examples, recov-
ering a secret leaks information to the other secrets while these schemes are
considered secure in view of the computational security. After determining the
shortcomings of the current security definition, we propose a new definition for
computational security and present an MSS scheme that enjoys rigorous proof
of security in terms of the new definition. In addition, a complete comparison
in terms of share size, number of public values, and required operations for
recovering a secret between our scheme and previous schemes indicates that the
presented scheme is efficient.
KEYWORDS
computational security, multisecret sharing, 1-way function, secret sharing
1 INTRODUCTION
There are some situations in which a sensitive informa-
tion, say secret, should be protected against losing or dis-
ruptive adversaries. In these situations, we cannot rely on
1 party. For example, suppose there is a database which is
encrypted by a symmetric cryptosystem. In this case, the
used key needs to be protected against malicious adver-
saries. Moreover, losing the key makes decryption quietly
infeasible. Hence, we need a method for storing sensitive
data to guarantee security and decrease the probability of
losing. A naive solution is to split the information and
assign each of the pieces to a trusted party. This approach is
not a proper solution because each of the participants has
a piece of the secret that means he/she gains some infor-
mation about the secret. Also, losing any piece by these
trusted parties makes the data irretrievable. To mitigate
these concerns, Shamir
1
and Blakeley
2
independently pro-
posed secret sharing. In secret sharing schemes, a secret is
distributed among many participants ={P
1
, … , P
n
} by
assigning each of them a share. This distribution is done in
such a way that just predetermined subsets of the partici-
pants can recover the secret using their shares. The set of
all authorized subset of participants is called access struc-
ture and is denoted by Γ. Therefore, unauthorized parties
(eg, malicious adversaries or any unauthorized subset of
participants) cannot gain any information about the secret.
Moreover, it helps to protect the data because losing some
Int J Commun Syst. 2017;e3399. wileyonlinelibrary.com/journal/dac Copyright © 2017 John Wiley & Sons, Ltd. 1 of 10
https://doi.org/10.1002/dac.3399