Proactive secret sharing is an underlying technique in Proactive Security Protocols. It is a method to update distributed keys (shares) in a secret sharing scheme periodically such that an attacker has less time to compromise shares and as long as the attacker visits less than a threshold or a quorum group, the system remains secure. This contrasts to a non-proactive scheme where if the threshold number of shares are compromised during the lifetime of the secret, the secret is compromised. The model which takes time constraints into account was originally suggested as an extension of the notion of Byzantine fault tolerance where redundancy of sharing allows robustness into the time domain (periods) and was proposed by Rafail Ostrovsky and Moti Yung in 1991.[1] The method has been used in the areas of cryptographic protocols in secure multi-party computation and in threshold cryptosystems.
If the players (holders of the shared secret) store their shares on insecure computer servers, an attacker could crack in and steal/learn the shares. Since it is not often practical to change the secret, the un-compromised (honest) (Shamir-style) shares should be updated in a way that they generate the same secret, yet the old shares are invalidated. There is also a need to recover shares of previously corrupted servers, and the community of honest server is needed to perform the recovery. This assures the longevity of the secure and recoverable sharing, or secure and correct secure computation protocols.If one needs to maintain sharing while changing the number of servers or the threshold, then proactive method with share recovery enables this, as was originally shown by Frankel and others.[2] [3] The ability of distributing the secret (codeword) and then recovering the distributed shares as the proactive secret sharing method does, was recognized as much needed in storage systems around 2010, and in reaction, coding theorists renamed the method, further refined it, and formalized is as `regenerating codes' and `locally recoverable codes.'
This follows somewhat the work in.[4] In order to update the shares, the dealers (i.e., the persons who gives out the shares; and in a distributed system it is all participants one at a time) generates a new random polynomial with constant term zero and calculates for each remaining player a new ordered pair, where the x-coordinates of the old and new pairs are the same. Each player then adds the old and new y-coordinates to each other and keeps the result as the new y-coordinate of the secret.
k-1
k
0 | |
x | |
i |
=f0(i)
i\in\{1,...,n\}
n
0 | |
x | |
i |
i
0
k
\deltai(z)=\deltai,1z1+\deltai,2z2+...+\deltai,kzk
i
ui,j=\deltai(j)
t+1 | |
x | |
i |
=
t | |
x | |
i |
+
t | |
u | |
1,i |
+...+
t | |
u | |
n,i |
t
All of the non-updated shares the attacker accumulated become useless. An attacker can only recover the secret if he can find enough other non-updated shares to reach the threshold. This situation should not happen because the players deleted their old shares. Additionally, an attacker cannot recover any information about the original secret from the update process because it only contains random information.
The dealer can change the threshold number while distributing updates, but must always remain vigilant of players keeping expired shares as in.[5] However this is a somewhat limited view since the original methods gives the community of server the ability to be the re-sharing dealer and the regenerator of lost shares.
The following example has 2 shares and a threshold of 2 with 2 players and 1 dealer. Since shares and polynomials are only valid for a certain time period, the time period they are valid is denoted with a superscript.
Z11
s=6\inZ11
Z11
f0(x)=6+2 x x
f0(0)=s=6
0 | |
x | |
1 |
=f0(1)=6+2 x 1=8
0 | |
x | |
2 |
=f0(2)=6+2 x 2=10
0 | |
x | |
1 |
0 | |
x | |
2 |
f0(x)
m=(f0(2)-f0(1))/(2-1)=
0 | |
(x | |
2 |
-
0 | |
x | |
1 |
)/(2-1)=(10-8)/(2-1)=2/1=2
b=f0(1)-m=
0 | |
x | |
1 |
-2=8-2=6
f0(x)=b+m x x=6+2 x x
f0(0)=6+2 x 0=6=s
0 | |
\delta | |
1 |
(z)=
0 | |
\delta | |
1,1 |
x z1=2 x z1
0 | |
\delta | |
2 |
(z)=
0 | |
\delta | |
2,1 |
x z1=3 x z1
0 | |
u | |
1,1 |
=
0 | |
\delta | |
1 |
(1)=2
0 | |
u | |
1,2 |
=
0 | |
\delta | |
1 |
(2)=4
Z11
0 | |
u | |
1,2 |
0 | |
u | |
2,1 |
=
0 | |
\delta | |
2 |
(1)=3
0 | |
u | |
2,2 |
=
0 | |
\delta | |
2 |
(2)=6
Z11
0 | |
u | |
2,1 |
1 | |
x | |
i |
=
0 | |
x | |
i |
+
0 | |
u | |
1,i |
+
0 | |
u | |
2,i |
1 | |
x | |
1 |
=
0 | |
x | |
1 |
+
0 | |
u | |
1,1 |
+
0 | |
u | |
2,1 |
=8+2+3=2\inZ11
1 | |
x | |
2 |
=
0 | |
x | |
2 |
+
0 | |
u | |
1,2 |
+
0 | |
u | |
2,2 |
=10+4+6=9\inZ11
1 | |
x | |
1 |
1 | |
x | |
2 |
f1(x)
f1(x)
m=(f1(2)-f1(1))/(2-1)=
1 | |
(x | |
2 |
-x1{1})/(2-1)=(9-2)/(2-1)=7/1=7
b=f1(1)-m=
1 | |
x | |
1 |
-7=2-7=-5=6
f1(x)=b+m x x=6+7 x x
f1(0)=6+7 x 0=6=s