Please use this identifier to cite or link to this item:
http://hdl.handle.net/10263/7497
Title: | A Modern Day Approach to Combinatorial Secret Sharing |
Authors: | Roy, Anandarup |
Keywords: | Combinatorial secret sharing Secure eID Cloud storage Tensor designs Ramp schemes SBIoT |
Issue Date: | Jul-2024 |
Publisher: | Indian Statistical Institute, Kolkata |
Citation: | 123p. |
Series/Report no.: | ISI Ph. D Thesis;TH626 |
Abstract: | n this thesis, we aim to develop generalised secret sharing protocols to enhance privacy, security and robustness in various applications. We begin by introducing various existing concepts related to secret sharing, including combinatorial repairable threshold schemes (RTSs), ramp schemes, balanced incomplete block designs (BIBDs), frameproofness, verifiability and hierarchy in the access structure. Our first work, motivated by the concepts of reparable threshold schemes by Stinson et al. develops extendable tensor designs built on balanced incomplete block designs. It then combines this construc- tion with the concepts of frameproofness by Desmedt et al. and consequently presents a frameproof version (which by definition, loses the property of share repairability). This results in a method of generalizing multiple BIBDs into a single, multi-level, ramp-type extendable secret sharing scheme, along with a discussion focusing on improvement of security, and reduction of share size as well as computation, particularly for application in IoT environments. A new graphical approach can be found in our paper that deals with the problem of secret and share reconstruction in the frameproof setup. Furthermore, a generalised combinatorial design resistant to framing has interesting implications in many areas of interest in distributed IoT devices. Vulnerabilities may arise in communication networks at various stages. For example, at the share distribution stage, anomalies may be introduced during data transfer from the dealer to some players. It is also possible that some (malicious) players try to frame others. Furthermore, there may occur false share contributions by some (malicious) players during the secret reconstruction stage. We present a novel approach to verify correct submission of shares by each participant during secret reconstruction through a lightweight cheater identification algorithm, which significantly improves the computational complexity of verification compared to existing algorithms. We move on to exploring ramp-type verifiable secret sharing schemes, and the application of hidden access structures in such cryptographic protocols. Inspired by Sehrawat et al.’s access structure hiding scheme, we develop an ϵ-almost access structure hiding scheme, which is verifiable as well as frameproof. We detail how the concept of ϵ-almost hiding is important for incorporating ramp schemes, thus making a fundamental generalisation of this concept. In particular, this proves that tensor designs are verifiable ramp-type secret sharing schemes. Finally, we explore hierarchy in access structures and formalize our ϵ-almost access structure hiding framework in the context of zero-knowledge proofs. We aim to achieve this by modelling a smart transportation system implemented through a new Hierarchical Secret Sharing (HSS) ramp scheme within this framework and instantiated with ASCON, a good lightweight verification authenticated encryption scheme. |
Description: | This thesis is under the supervision of Prof.Bimal Kumar Roy and Prof. Mridul Nandi |
URI: | http://hdl.handle.net/10263/7497 |
Appears in Collections: | Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Thesis-Anandarup_21-1-25.pdf | Thesis | 1.04 MB | Adobe PDF | View/Open |
Form 17-Anandarup.pdf | Form 17 | 394.55 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.