Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things. Due to the large number and different types of nodes in wireless sensor networks, layered secret key sharing technology is increasingly used in wireless sensor networks. In a hierarchical secret sharing scheme, participants are divided into sections with different permissions for each team, but the same permissions for participants in the same team. In this article, we follow the approach of the hierarchical secret sharing scheme derived from the linear homogeneous recurrence relations. We design a hierarchical multi-secret sharing scheme for wireless sensor networks on the basis of the elliptic curve public key cryptosystem combined with the linear homogeneous recurrence relations. In the proposed scheme, we do not make sure that the participants are half-truthful. In addition, the participants’ shadows can be reused. Our scheme is computational security. Only one share from each member is required in our hierarchical multi-secret sharing scheme. It is more suitable for wireless sensor networks compared to the up-to-date schemes.
In a secret sharing scheme of threshold,1 the secret is passed around in participants, and when it is required, any or more participants can retrieve the shared secrets by combining their shares. A handy case of secret sharing is the distributed storage of sensitive information. Such a solution is called perfect scheme if any participant of any ineligible subset does not have access to any information about the shared secrets. Shamir1 and Blakley2 raised the threshold secret sharing schemes, two exceptional cases where all the participants have the same privileges.
There are restrictions on threshold secret sharing schemes in reality. Therefore, to enhance the feasibility of secret sharing in practice, many researchers concentrate on particular sets of access structures, for instance, weighted threshold access structure, compartmented access structure, graph-based access structures,3 bipartite access structures4 and hierarchical access structure.5 A large number of studies in our community have been focused on the protection (e.g. privacy,6 security,7 malicious behaviours)8 of our lives, towards constructing a safer information environment. Shamir proposed the weighted threshold secret sharing scheme.1 But the secret sharing scheme1 is a trivial solution by assigning multiple shares to each participant according to its integral weight, which is inefficient. Simmons9 presented a multipartite access structure, and the definitions of the compartmented access structure and the hierarchical access structure were given by him. After Simmons, Brickell10 introduced an approach to give an ideal secret sharing scheme for the multilevel and compartmented access structures. The multipartite access structure can classically be divided into the hierarchical access structure and the compartmented access structure.2,11
Tassa12 proposed some hierarchical threshold access structures rested on Birkhoff interpolation, and the interpolation matrix must satisfy Polya’s condition.12 Farras et al.13 gave a comprehensive characteristic of the ideal multipartite access structures. Then the scholars investigated the hierarchical secret sharing schemes by using the findings on integer polymatroids in the solution given by Farras et al.14 These techniques offered a characterization of the hierarchical access structures and by these techniques, there admits the ideal and perfect secret sharing scheme existing for the hierarchical access structures.14,15 Chen et al.16 proposed a method to give an ideal scheme that implements the compartmented access structure by the general polymatroid-based method presented in Farras et al.’s solution14 and the Gabidulin17 codes. Chen et al.18 proposed a method of implementing the multipartite access structure. Motivated by the integer polymatroids, the main idea of Chen et al.’s scheme18 from Brickell10 provides a polynomial-time algorithm to build such a matrix , which makes all the determinants of those particular multi-matrices non-zero in certain limited domains.
The methods mentioned above do not introduce verifiability. Also, researchers have worked out verifiable resolutions for the classic secret sharing schemes. Motivated by Birkhoff interpolation, Traverso et al.19 gave a verifiable hierarchical secret sharing method. But this method has the shortcomings of these schemes rested on Birkhoff interpolation. The drawback of the above hierarchical threshold access structure is that the distributor must perform exponential examinations when allocating identifications and shares to the members. Xu et al.20 proposed an efficient compartmented secret sharing scheme. Yuan et al.21 provided an ideal polynomial-time hierarchical secret sharing scheme based on linear homogeneous recurrence (LHR) relations. We present a verifiable hierarchical secret sharing scheme rested on Xu et al.20 So, our method is more efficient than Traverso’s solution.19
The rest of the article focuses on the following sections. The second section leads to the secret sharing scheme, LHR relations, as well as Bilinear Pairing and Diffie–Hellman problem. The third section describes the system proposed in our article. In the fourth section, we demonstrate the security analysis of our solution, the significant attributes of our solution and show the comparisons with other solutions. In the fifth section, conclusions are provided.
Preliminary
Secret sharing schemes
In this part, we show the statement of the hierarchical access structure.
Definition 1
A threshold secret sharing scheme over ( is the aggregate of game participants, that is and ), satisfying the two following conditions, in which is the shared secret space, is the share space, and is an aggregate of random feeds.
A brief overview of the hierarchical access structure is provided in the following section.
Definition 2
Make indicate the total number of participants. In the hierarchical secret sharing scheme, the participants can be grouped into classes of the participants, and for all The class contains participants, in which . Let be assorted in ascending sequence, The hierarchical threshold access structure is
LHR relations
We briefly describe the LHR relations. The LHR relations are introduced in detail in the studies by Xu and other peers.22–25
Theorem 1
Let be a series of numbers and be the different roots of the following characteristic equation of the LHR relation with constant coefficients
where , is chosen over , and is a large prime.
If is a -fold root of the characteristic equation (1), then the part of the resolution of the recurrence relation with respect to is given as
Let . We can have
For recursive relations, the usual solution is derived from the following
where
If then for the recurrence relation the general solution is
where
Diffie–Hellman problem
Given a cycle additive group , with being the generator and the order of being the large prime ,
The problem of the discrete logarithm is defined as computing , provided , where ;
The computational Diffie–Hellman (CDHP) problem is defined as computing , provided , where ;
The decisional Diffie–Hellman problem (DDHP) is defined as deciding whether , provided , where .
It is called the GDH group when DDHP is solvable in polynomial time, but no probabilistic algorithm can solve CDHP in the polynomial time with a non-negligible advantage.
Bilinear pairing
Suppose that and are an additive group and a multiplicative group, respectively, with the same prime order . Here is a large prime. Let be a generator of . Suppose that DDHP is easy in and hard in . We assume CDHP in and the DDHP in are hard. We call it the cryptographic bilinear mapping, if a mapping satisfies the following properties:
Bilinearity: ,
Non-degeneracy: If is a generator of , then the generator of is . In other words, if , then .
Computability: , there is a polynomial-time algorithm to compute .
The proposed scheme
In the following section, we show how the proposed scheme works. The proposed scheme is built upon the LHR relations and the elliptic curve public key cryptosystem (ECC). denotes the set of the participants, where is the ith participant in the set, . Our scheme is composed of three stages, namely, initialization stage, construction stage and recovery stage. In the initialization stage, we initialize some functions or parameters; in the construction stage, the shared secrets are hidden in these terms , and in the recovery stage, we recover the shared secrets by getting these terms first. The distributor is honest in our scheme. But the participants can be malicious, because in our scheme the participants can be detected if they provide fake pseudo shares. The distributor acts the role in the construction stage and the participants act the role in the recovery stage.
We first describe the main idea of the proposed scheme. The proposed scheme contains participants and one dealer/distributor. Only one shadow is held by each participant . The distributor selects random LHR relations. In the construction stage, the participants in are used to construct LHR relations and the participants in are used to build LHR relations, where . So some participants can be replaced by other participants who have the higher privilege. That is, the participants in can replace the participants in , where . Then, the distributor adds the general terms of the LHR relations. From Theorem 1, we know that the sum is a general term of an LHR relation and we denote this LHR relation as -LHR relation. The distributor selects the shared secrets and keeps the shared secrets hidden in the first several terms of F-LHR relation. So in the recovery stage, the recovery of the shared secrets is achieved through resolving the general term of -LHR relation. After that, we obtain the items that hide the shared secrets. The notations used are shown in Table 1.
Notation table.
Notation
Description
The set of participants
The ith participant in set
The ith shared secret
The shadow hold by the ith participant
The shadow hold by the distributor
The ith subset of the participant
The ith term in the sequences and is written as in our scheme. In our scheme, we use to denote the general term
The large prime
The finite field
The additive group with the generator and the order of is
The multiplicative group with the order
The share was generated by distributor and published
The share was generated by the ith participant and published
The pseudo share
The double-parameter one-way function
The jth linear homogeneous recurrence relation
random values
Initialization stage
The proposed scheme is rested on the LHR relations in , where is a finite field. denote the secrets that can be shared among the participants. The participant herself or himself chooses the shadow , not the distributor for the selection. In this way, it is possible to protect the key distributor from forgery.
1. An elliptic curve over is selected by , in which is a large prime. Assume that is an additive group with the order . Assume that DDHP is simple and CDHP is tough in .
Suppose to be the elliptic curve. Assume to be a multiplicative group with the same order . Suppose to be a bilinear mapping and the conditions in the section ‘Bilinear pairing’ can be satisfied.
2. selects a generator for .
3. These values are published/released by .
Each participant chooses to be the shadow for himself/herself and then calculates , . Each participant keeps and then securely sets to . should ensure that , if . In the case where , these participants will then be asked by to pick their shadows again. releases , in which is the participant ’s identity. In the last part of this section, we define a double-argument one-way function as given in the study by Chien et al.11 Given random value and value , the represents a double-argument one-way function that is easily computed. In some cases, though, it is difficult to be computed:
Knowing and , is hard to be worked out.
Unknowing , is hard to be worked out for any .
Knowing and , is hard to be calculated.
Knowing and , for , is hard to be calculated.
Knowing , it is quite a challenge to get two such distinct characters and that .
Construction stage
In the construction stage, the key distributor first generates different LHR sequences . In our scheme, are the degrees of the characteristic equation of the LHR relations , where denotes the jth LHR relation. Figure 1 shows the construction stage, where denotes and Pshare denotes the pseudo share.
Construction stage.
Theorem 2
The addition of two general terms of two different LHR relations is a general term of an LHR relation.
Proof of Theorem 2
Suppose that and are the general terms of two different LHR relations with the different degrees and , respectively, and assume . So, it is only necessary to prove that is the general term of an LHR relation. From Theorem 1, we know is the generic term of an LHR relation, and is the degree of the LHR relation .
The distributor distributes the shares through the following procedure:
1. The distributor randomly selects the integer and publishes them.
2. chooses , computes , makes sure and publishes , where .
3. The distributor chooses different integers over and publishes them, where each of them is non-zero.
4. selects the value to make as the auxiliary function of an LHR relation, where and .
5. computes the pseudo share and , where , and is the quantity of participants in the sub-group .
6. considers the first LHR sequence which is defined as
We use the participants in the sub-group to build the first LHR sequence. During the recovery stage, the general term of the first LHR sequence is allowed to be retrieved only by the participants in the sub-group .
7. computes , where .
8. computes and publishes , where .
9. continues to generate LHR sequences. The jth LHR sequence is generated as follows, for .
9.1. selects the value to make as an auxiliary function of an LHR relation, where and .
9.2. computes , where , and is the number of the participants in the subset , where is denoted as . That is, .
9.3. considers the jth LHR sequence , which is defined by
We use the participants in the subset to construct the jth LHR sequence. In the recovery stage, only the participants in the subset can recover the general term of the jth LHR sequence.
9.4. computes , where .
9.5. computes and publishes , where .
10. After the LHR relations are generated, combines them into an LHR relation. Let . From Theorem 2, we can determine that is the general term of an LHR relation and the degree of this LHR relation is . Since the degrees of these LHR relations correspond to , respectively, so the sum of these degrees is . However, we define the threshold of the hierarchical secret sharing scheme as , because different participants can recover the shared secrets (Since at least participants from the subset , at least participants from the subset and so on, and the last participants from the subset can recover the LHR relation , the threshold of the hierarchical secret sharing scheme is ).
11. computes and publishes , where . This means that we can hide the shared secrets in these terms .
Remark 1
The double-parameter one-way function makes sure that for the same , the random values and are different, where . This means that if some participants’ pseudo shares are used to construct different LHR relations, the double-parameter one-way function makes sure that for the same pseudo share, the random values are different.
Recovery stage
In this section, we present how the shared secrets are recovered. First, a proposition is given as follows.
Proposition 1
Provided that is a ti-fold root of the characteristic formula of an LHR relation and the general resolution of this LHR relation is obtained as
its coefficient can then be fixed by the initial values, which is achieved by resolving the system of linear formulas, in which
The participant can get every participant’s pseudo share by exchanging in a qualified sub-group, where . In the qualified sub-group, the participants need to recover LHR sequences before obtaining the shared secrets. The jth LHR sequence is recovered as follows.
From the construction stage, we know that the order of the jth LHR relation is . We need at least participants when we are trying to recover the jth LHR sequence. But there are participants from (if participants use their pseudo shares to solve the general term of the (j-1)th LHR relation, they need to be combined to solve the general term of the jth LHR relation, where ). The other participants are from the subset .
With the use of those pseudo shares, the participants of the qualified sub-groups compute items of the jth LHR relation as follows
Based on Proposition 1, points leads to the determination of the degree polynomial , and its definition is
where and the superscript of represents different polynomial. According to Theorem 1, , in which is a degree polynomial and , we can have the general term . After obtaining general terms of LHR sequences , the general term is
where the order of the LHR relation is . But the global threshold is (If participants from the subsets use their pseudo shares to recover the general term , then they must use their pseudo shares to recover the general terms . For example, if participants from use their pseudo shares to recover the general term , participants need to use their pseudo shares to recover the general terms from the second LHR sequences to the last LHR sequences. So the scheme needs at least participants to recover the shared secrets). From and the published value of , the shared secrets can be obtained by , .
Remark 2
In the recovery stage, a participant can detect whether another participant is honest or not by the function . If , then the participant can say that the participant is honest, because and are public.
Illustrative sample
We present an example to demonstrate the proposed scheme and show how the LHR relation is useful in the hierarchical access structures in this section. For illustration convenience, we suppose that in a company there are employees, and the employees are divided into two disjoint levels , the managers and the employees (the authorities of the managers are higher than the employees). There are managers in the subset and employees in the subset , where . At least staff of them can recover the shared secrets, among which at least are managers, where . We select two values and , and make
as two different auxiliary functions for the two different LHR relations. After the steps from 5 to 9.5 as described in the construction stage have been done (with = 2 here), we can have
where
We note that the distributor uses managers’ pseudo shares to generate the LHR sequence {} and staff members (include the managers and the employees) to generate the LHR sequence . That is, only at least managers can solve the general term of the sequence {}. Still, at least staff members can solve the general term of the sequence , where out of are managers (Because the privilege of the managers is higher than the employees, they should combine the pseudo shares to solve the second general term . If the employees are not enough, other managers except the can combine the employees to pool the pseudo shares to solve .) We hide the shared secrets in these terms .
From the above, we can get that our scheme’s global threshold is , because our scheme needs at least participants from to recover the shared secrets.
The security analysis and discussion of our scheme
In this section, we first present the possible attacks and prove that our scheme is secure. Then we show the performance of our scheme and compare it with the scheme by Traverso et al.19
Security analysis
In this section, we call all of and share-related information, where is the shadow that is randomly selected by the participant or distributor himself or herself, ( is public), and , . First, we prove the security of the share-related information. Second, we prove the security for the participants in the unqualified subset. The security of the share-related information is easy to be proved.
Theorem 3
The share-related information is secure, provided the CDH-assumption is intractable.
Proof of Theorem 3
If the adversaries want to break the share-related information, they should obtain useful information from the public values , . We assume that the adversaries can break the share-related information with the non-negligible probability . That is, given and , the adversaries can get or extract (or ) with the non-negligible probability as well, where . This contradicts the Diffie–Hellman problem. The adversaries may give a fake , but the other honest participants can decide whether is right or not (because DDHP is easy in ). If it matches, then the other honest participants can say that the value is valid. Otherwise, it is invalid. Thus, the share-related information is secure.
In the following section, we demonstrate why the proposed solution is safe for a subset of participants who do not qualify. When participants in the ineligible subset want to recover the secrets, they must recover every LHR sequence. For illustration convenience, we suppose that the unqualified subset satisfies the conditions as follows
where , , and That is to say, the unqualified subset can recover other sequences, except the jth LHR sequence. Since is chosen by himself/herself and , we can say that each is uniformly chosen in , that is, for each , all values in have the same probability. From the public value , the characteristic equation of an LHR relation can be determined, according to Theorem 1. If the relation of the sequences is given, the characteristic equation can be determined, and then the root of the characteristic equation can be found. Thus the public value discloses no information apart from characteristic equation of an LHR relation, .
Theorem 4
The degree of the LHR relation is safe to the unqualified participants when and only when the polynomials with degree is safe to the unqualified participants.20
Proof of Theorem 4
Assume that the order of the LHR relation is safe to the unqualified participants. Using equations (4), (6) and (2) and the public value , we could obtain
in which the degree of is . It is clear from the above that public value gives away no information except characteristic equation. If the polynomial with degree is unsafe for unqualified participants, it means that the points can determine a polynomial with degree . We can also deduce from equation (7) that the value can obtain the LHR relation with the degree . This is contradicted with Proposition 1.
(⇐) Assume that the polynomial with the degree is safe for the unqualified participants. If the LHR relation with degree is insecure, then random terms () can determine the LHR sequences. Following equation (7), we select the distinct terms and then can obtain the points of the polynomial with degree . Then we can determine the polynomial . It can be said that the points could decide a polynomial with degree . This contradicts our assumptions. Therefore, the question of recovering the jth LHR relation from participants in the disqualified subset that satisfies the aforementioned condition could be regarded as the question of whether points could decide the polynomial with the degree .
We can draw the conclusion that the possibility of cracking our scheme is no better than the possibility of cracking the Diffie–Hellman problem. Therefore, it can be considered that our scheme is safe.
Performances
From the section ‘The proposed scheme’ and the security analysis above, we conclude that the proposed scheme is a secure and verifiable hierarchical secret sharing scheme. In this section, we show some essential characteristics. In the proposed scheme, each participant’s ID is posted on a publicly available message board, and each participant’s shadow is selected by himself/herself over . Each participant can verify whether the pseudo-random shares of other participants are correct. Throughout the entire process, each participant only needs to hold one shadow, and the shared secrets are selected over . So the shadow held by a participant is as long as the shared secret.
Each participant obtain pseudo-random shares from the other participants, and each participant’s communication and computation is the same (Since participants are required to recover the secrets, each participant needs to communicate with participants, so the times of the communication for each participant is ). The computation refers to recovering the secrets with the obtained pseudo-random shares (including their own and those obtained by exchanging with other participants). In the recovery stage, from equation (6), we know that computational complexity of our scheme depends on the degree of polynomial (because the degree of the polynomial is highest among these polynomials , where ) and the power of a constant . The computational complexity of the polynomial is and the computational complexity of the power of a constant is . So the computational complexity of our scheme is .
In the case when the system needs to be reinitialized with the LHR relations, our scheme only needs to provide the new values without changing participants’ shadows. It is possible to obtain a further while not modifying the shadows.
Comparisons
In the solution by Traverso et al.,19 when allocating identities and shares to participants, the distributor must perform a potentially exponential number of checks. In our scheme, participants do not have to check the non-regularity of many matrices. They just need to construct different LHR relations, find the general terms of them and add these terms. More precisely, we can conclude that the participants only need to do the evaluation calculation of polynomials and the summation calculation of different polynomials in our scheme by induction. The computational complexity of the polynomial is and the computational complexity of the power of a constant is . So the computational complexity of our scheme is as given in the study by Yuan et al.21 But more values should be published. So comparing to Traverso’s et al.19 scheme, our scheme is more efficient.
Conclusion
We present a hierarchical secret sharing scheme with the LHR relations and the ECC. The performance of the proposed method is also listed below. The LHR relations could be utilized for constructing a verifiable hierarchical secret sharing scheme. The participants’ shadows are selected by themselves in the proposed scheme. Therefore, no deception exists between the distributor of the shared secrets and the participants. In the whole scheme, only one shadow is held by one participant, and the secret is the same length as the shadow. The proposed scheme is not required to keep a safe channel between the distributor and the participant. The participants cannot cheat each other.
Our scheme overcomes the drawbacks that the distributor will have to do potentially exponential multiple checks for distributing identifications and shadows to participants on the basis of Birkhoff interpolation. But our scheme needs more public values than the existing popular schemes.
Footnotes
Handling Editor: Yanjiao Chen
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship and/or publication of this article: This work is supported by the National Natural Science Foundation of China under Grant No.61873069.
ORCID iD
Hongliang Zhu
References
1.
ShamirA. How to share a secret. Commun ACM1979; 22(11): 612–613.
2.
BlakleyGR. Safeguarding cryptographic keys. In: Managing requirements knowledge, international workshop on IEEE computer society, New York, 4–7 June 1979, pp.313–317. New York: IEEE.
3.
BlundoCDe SantisAStinsonDR, et al. Graph decompositions and secret sharing schemes. J Cryptol1995; 8(1): 39–64.
4.
PadróCSáezG. Secret sharing schemes with bipartite access structure. IEEE Trans Inf Theory2000; 46(7): 2596–2604.
LiQMiJLiW, et al. CNN-based malware variants detection method for internet of things. IEEE Internet Things J2021; 8(23): 16946–16962.
7.
ChenMLiaoXWuM. Pulseedit: editing physiological signals in facial videos for privacy protection. IEEE Trans Inf Forensics Secur2022; 17: 457–471.
8.
HuJLiaoXWangW, et al. Detecting compressed deepfake videos in social networks using frame-temporality two-stream convolutional network. IEEE Trans Circuits Syst Video Technol2021; 32(3): 1089–1102.
9.
SimmonsGJ. How to (really) share a secret. In: Conference on the theory and application of cryptography, Santa Barbara, CA, 21–25 August 1988, pp.390–448. New York: Springer.
10.
BrickellEF. Some ideal secret sharing schemes. In: Workshop on the theory and application of cryptographic techniques, Houthalen, 10–13 April 1989, pp.468–475. Berlin: Springer.
11.
ChienHYJanJKTsengYM. A practical (t, n) multi-secret sharing scheme. IEICE Trans Fundam Electron Commun Comput Sci2000; 83(12): 2762–2765.
FarrasOMart-FarréJPadróC. Ideal multipartite secret sharing schemes. In: Annual international conference on the theory and applications of cryptographic techniques, Barcelona, 20–24 May 2007, pp.448–465. New York: Springer.
FarrasOPadróC. Extending brickell–davenport theorem to non-perfect secret sharing schemes. Des Codes Cryptogr2015; 74(2): 495–510.
16.
ChenQTangCLinZ. Efficient explicit constructions of compartmented secret sharing schemes. Des Codes Cryptogr2019; 87(12): 2913–2940.
17.
GabidulinEM. Theory of codes with maximum rank distance. Probl Peredachi In1985; 21(1): 3–16.
18.
ChenQTangCLinZ. Efficient explicit constructions of multipartite secret sharing schemes. IEEE Trans Inf Theory2021; 68(1): 601–631.
19.
TraversoGDemirelDBuchmannJ. Dynamic and verifiable hierarchical secret sharing. In: International conference on information theoretic security, Tacoma, WA, 9–12 August 2016, pp.24–43. New York: Springer.
20.
XuGYuanJXuG, et al. An efficient compartmented secret sharing scheme based on linear homogeneous recurrence relations. Secur Commun Netw2021; 2021: 5566179.
21.
YuanJYangJWangC, et al. A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations. Inform Sci2022; 592: 36–49.
22.
XuGYuanJXuG, et al. A new multi-stage secret sharing scheme for hierarchical access structure with existential quantifier. Inf Technol Control2021; 50(2): 236–246.