Is this the first ever practically-deployed use of a threshold scheme?
Thierry Moreau
thierry.moreau at connotech.com
Wed Aug 4 11:23:06 EDT 2010
Tanja Lange wrote:
>> There is more than the UI at stake here, i.e. the basic functionality of
>> the scheme. Say you distribute shares in a 4 out of 7 scheme (ABCDEF)
>> and share A is published on the web. How do you recover from the
>> remaining 3 out of 6 scheme into a 4 out of 6 scheme without having a
>> key ceremony? In an ad-hoc multi-party scheme, you request 4 of the
>> remaining compliant parties to destroy key material allowing them to
>> participate in a group with the traitor A, but no other key material. No
>> system UI, but admittedly a coordination nightmare!
>>
>
> If the system is built to allow resharing then this is no problem.
>
> Resharing from a t-out-of-n scheme to an r-out-of-m scheme works as
> follows: If the secret s is shared using the (otherwise random)
> polynomial f of degree t then a share consists of (i,f(i)). To
> reshare, at least t or the original shareholders issue shares of
> f(i) in an r-out-of-m manner, i.e. take a polynomial gi of degree r and
> compute m shares (i,j,gi(j)). When these are distributed to the new
> users, the new users should end up with matching j's. The old shares
> (i,f(i)) are deleted. Each of the m new users now has t shares
> (i1,j,gi1(j)), (i2,j,gi2(j)), ... ,(it,j,git(j)). This information
> can be combined into a single share (j,G(j)) of s by using the Lagrange
> coefficients of the first scheme.
>
> All of this can be decorated with zero knowledge proofs to prove
> correctness of the shares etc. Note that there is no interaction of the
> t shareholders and everthing can be done remotely.
>
> In the scenario that one share A is published it's enough to have t-1
> users help in the resharing since every new user can use the public
> information. On the other hand that's a mess to program, so it's more
> resonable to ask t of the remaining shareholders to help. Doesn't sound
> like a coordination nightmare to me.
>
> For all this in a more general setting see e.g. "Redistributing Secret
> Shares to New Access Structures and Its Applications" by Yvo Desmedt
> and Sushil Jajodia (1997)
> http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.45.3353
>
> Does this answer the question?
Yes, or at least it gives a good sense that these issues has been dealt
with in the cryptographic literature. It seems to fulfill the
operational requirements (obviously when a good faith participant
receives new shares from a remote party, a trust relationship is needed,
but that is a given irrespective of the underlying crypto).
Thanks a lot for your answer!
Regards,
--
- Thierry Moreau
> Tanja
>
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list