Proactive secret sharing is a method to update distributed keys (shares) in a secret sharing scheme periodically such that an attacker has less time to compromise shares. This contrasts to a non-proactive scheme where if the threshold number of shares are compromised during the lifetime of the secret, the secret is compromised.
If the players (holders of the shared secret) store their shares on insecure computer servers, an attacker could crack in and steal the shares. Since it is not often practical to change the secret, the uncompromised (Shamir-style) shares should be updated in a way that they generate the same secret, yet the old shares are invalidated.
In order to update the shares, the dealer (i.e., the person who gives out the shares) generates a new random polynomial with constant term zero and calculates for each remaining player a new ordered pair, where the x-coordinates of the old and new pairs are the same. Each player then adds the old and new y-coordinates to each other and keeps the result as the new y-coordinate of the secret.
The dealer constructs a random polynomial over a field of degree k − 1 where k is the thresholdEach player gets the share x i 0 = f 0 ( i ) where i ∈ { 1 , . . . , n } , n is the number of players, and x i 0 is the share for player i at time interval 0 The secret can be reconstructed via interpolation of k sharesTo update the shares, all parties need to construct a random polynomial of the form δ i ( z ) = δ i , 1 z 1 + δ i , 2 z 2 + . . . + δ i , k z k − 1 Each player i sends all other players u i , j = δ i ( j ) Each player updates their share by x i t + 1 = x i t + u 1 , i t + . . . + u n , i t where t is the time interval in which the shares are validAll of the non-updated shares the attacker accumulated become useless. An attacker can only recover the secret if he can find enough other non-updated shares to reach the threshold. This situation should not happen because the players deleted their old shares. Additionally, an attacker cannot recover any information about the original secret from the update process because it only contains random information.
The dealer can change the threshold number while distributing updates, but must always remain vigilant of players keeping expired shares.
The following example has 2 shares and a threshold of 2 with 2 players and 1 dealer. Since shares and polynomials are only valid for a certain time period, the time period they are valid is denoted with a superscript.
All parties agree on a finite field: Z 11 The dealer establishes a secret: x = 6 ∈ Z 11 The dealer constructs a random polynomial over Z 11 of degree 2 - 1 (threshold of 2) f 0 ( x ) = 6 + 2 × x note f 0 ( 0 ) = x = 6 Player 1 gets share x 1 0 = f 0 ( 1 ) = 6 + 2 × 1 = 8 and player 2 gets share x 2 0 = f 0 ( 2 ) = 6 + 2 × 2 = 10 To reconstruct the secret, use x 1 0 and x 2 0 Since f 0 ( x ) is a line, we can use point slope form to interpolate m = ( f 0 ( 2 ) − f 0 ( 1 ) ) / ( 2 − 1 ) = ( x 2 0 − x 1 0 ) / ( 2 − 1 ) = ( 10 − 8 ) / ( 2 − 1 ) = 2 / 1 = 2 b = f 0 ( 1 ) − m = x 1 0 − 2 = 8 − 2 = 6 f 0 ( x ) = b + m × x = 6 + 2 × x f 0 ( 0 ) = 6 + 2 × 0 = 6 = x To update the shares, all parties need to construct random polynomials of degree 1 such that the free coefficient is zeroPlayer 1 constructs δ 1 0 ( z ) = δ 1 , 1 0 × z 1 = 2 × z 1 Player 2 constructs δ 2 0 ( z ) = δ 2 , 1 0 × z 1 = 3 × z 1 Each player evaluates their polynomial and shares some information with other playersPlayer 1 computes u 1 , 1 0 = δ 1 0 ( 1 ) = 2 and u 1 , 2 0 = δ 1 0 ( 2 ) = 4 in Z 11 Player 1 sends Player 2 u 1 , 2 0 Player 2 computes u 2 , 1 0 = δ 2 0 ( 1 ) = 3 and u 2 , 2 0 = δ 2 0 ( 2 ) = 6 in Z 11 Player 2 sends Player 1 u 2 , 1 0 Each player updates their share by x i 1 = x i 0 + u 1 , i 0 + u 2 , i 0 Player 1 computes x 1 1 = x 1 0 + u 1 , 1 0 + u 2 , 1 0 = 8 + 2 + 3 = 2 ∈ Z 11 Player 2 computes x 2 1 = x 2 0 + u 1 , 2 0 + u 2 , 2 0 = 10 + 4 + 6 = 9 ∈ Z 11 Confirm updated shares generate same original secretUse x 1 1 and x 2 1 to reconstruct the polynomial f 1 ( x ) Since f 1 ( x ) is a line, we can use point slope m = ( f 1 ( 2 ) − f 1 ( 1 ) ) / ( 2 − 1 ) = ( x 2 1 − x 1 1 ) / ( 2 − 1 ) = ( 9 − 2 ) / ( 2 − 1 ) = 7 / 1 = 7 b = f 1 ( 1 ) − m = x 1 1 − 7 = 2 − 7 = − 5 = 6 f 1 ( x ) = b + m × x = 6 + 7 × x f 1 ( 0 ) = 6 + 7 × 0 = 6 = x