论文部分内容阅读
A secret sharing scheme is a method to share secrets among some shareholders such that the shared secrets can be recovered only by certain authorized sets, not by the unauthorized sets. However, in practice,attackers who corrupted an unauthorized set are often able to obtain some or even all of the uncorrupted shareholders’ memory information by a great variety of side channel attacks. Then, they can illegally obtain the partial information or even all of the shared secrets. Facing such attacks, all existing secret sharing schemes are no longer secure. In this paper, we investigate how to construct secure secret sharing schemes with the presence of memory leakage, we call them memory leakage-resilient secret sharing schemes(MLR-SS schemes).We present the formal definition of MLR-SS scheme and construct two MLR-SS schemes by combining the existing secret sharing schemes with physical unclonable functions(PUFs). With these two concrete examples,we are attempting to demonstrate the use of PUFs in constructing MLR-SS schemes.
However, in practice, attackers who corrupted an unauthorized set are often able to obtain some or even all of the uncorrupted shareholders’ memory information by a great variety of side channel attacks. Then, they can illegally obtain the partial information or even all of the shared secrets. Facing such attacks, all existing secret sharing schemes are no longer secure. We this the legal definition of MLF-SS scheme and construct two (MLR-SS schemes). MLR-SS schemes by combining the existing secret sharing schemes with physical unclonable functions (PUFs). With these two concrete examples, we are attempting to demonstrate the use of PUFs in constructing MLR-SS schemes.