. C O / 0 21 12 69 18 N ov 2 00 2 On ASGS framework : general requirements and an example of implementation

ثبت نشده
چکیده

In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to prevent the dealer from knowing the secret or even to eliminate him at all. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the dealer does not know the secret and the secret owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasize on PVSS and pre-positioned secret sharing. Finally, we illustrate framework with practical implementation. 1. INTRODUCTION Everybody knows situations, where permission to trigger certain action requires approval of several selected entities. Equally important is that any other set of entities cannot trigger the action. Secret sharing allows to split a secret into different pieces, called shares, which are given to the participants, such that only certain group (authorized set of participants) can recover the secret. To make this requirement realistic, one should avoid situations were some of the protocol parties have dominant position. This reasoning resulted in creation of famework for ASGS. Secret sharing schemes (SSS) were independently invented by George Blakley [2] and Adi Shamir [13]. Many schemes have been presented since, for instance, Asmuth and Bloom [1], Brickell [5], Karin-Greene-Hellman (KGH) [8]. SSS can work in two modes: 1. Split control. In this case the secret itself is important, hence protected by distributing its pieces to different parties. This mode is, for instance, applied to protect proprietary secrets (e.g., Coca-Cola secret formula) or cryptographic keys. 2. Authentication. The content of the secret is secondary to the fact that only participants from the authorized set are able to recover it. This property allows to authenticate/identify parties taking part in the protocol. If they are able to recover the right secret, they are the chosen/right ones. Once secret sharing was introduced, people started to develop extended capabilities. Some of examples are: detection of cheaters and secret consistency verification (e.g. [11], [12], [14]), multi-secret threshold schemes (e.g., [11]), pre-positioned secret sharing schemes (e.g., [11]). The other class of extended capabilities focuses on anonymity, randomness and automatization for secret sharing procedures. Anonymous and random secret sharing was studied by Blundo, Giorgio Gaggia, Stinson in …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On ASGS framework: general requirements and an example of implementation

In the paper we propose general framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying secret sharing scheme. ASGS allows to prevent the dealer from knowing the secret or even to eliminate him at all. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unkno...

متن کامل

iv : n uc l - th / 0 11 00 25 v 2 2 8 N ov 2 00 1 Nuclear masses : evidence of order – chaos coexistence

Shell corrections are important in the determination of nuclear ground– state masses and shapes. Although general arguments favor a regular single– particle dynamics, symmetry–breaking and the presence of chaotic layers cannot be excluded. The latter provide a natural framework that explains the observed differences between experimental and computed masses.

متن کامل

An efficient implementation of Delaunay triangulations in medium dimensions

We propose a new C++ implementation of the well-known incremental algorithm for the construction of Delaunay triangulations in any dimension. Our implementation follows the exact computing paradigm and is fully robust. Extensive comparisons have shown that our implementation outperforms the best currently available codes for convex hulls and Delaunay triangulations, and that it can be used for ...

متن کامل

ar X iv : n uc l - ex / 0 21 00 14 v 2 2 0 N ov 2 00 2 1 Anisotropic flow

Recent experimental results on directed and elliptic flow, theoretical developments, and new techniques for anisotropic flow analysis are reviewed.

متن کامل

- th / 0 21 10 94 v 1 2 8 N ov 2 00 2 1 Dissipation near the QCD phase transition

We set up a framework for field theoretical studies of systems out of thermal equilibrium and zoom in on the dissipation of disoriented chiral condensates. Short relaxation times are obtained in the phase transition region, jeopardizing the definiteness of a DCC signal.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002