A Novel Way of Providing Confidentiality to Shared Secret Key and Authenticate the Shares during Reconstruction

نویسنده

  • P Devaki
چکیده

If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the other users. So this can protect the important information and also protect the key by sharing. If the key is not shared, then always there may be a threat of key being compromised intentionally or unintentionally. If the key is shared among the authorized users, at the time of requirement to use the information, few authorized users can use their shares to reconstruct the key and use it. This avoids the drawbacks of the single user having the key. Also it is necessary to authenticate the shares given by the users during reconstruction of the key. This facilitates the verification of the modified shares or fake shares sent by the authorized or unauthorized users. To achieve the confidentiality of the key we are using the threshold secret sharing method where the key will be divided in to number of shares depending on the number of authorized users and represent those shares in Braille format, and to provide authentication we are using SHA-1 algorithm. The key can be text data, image.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption

In this paper, a secured (t, n) threshold secret sharing scheme has been proposed which prevents cheating from participants as well as from trusted dealer (TD) (which distributes shared secrets and reconstructs shared secret key). Here, a signcryption scheme based on elliptic curve cryptography (ECC ) which incorporates both the digital signature and encryption scheme in a single logical step i...

متن کامل

A Key Based Secure Threshold Cryptography for Secret Image

This paper presents a key based secured (k, n) threshold cryptography where key is used to encrypt the secret and then the secret as well as key is shared among set of n participants. In sharing phase, each secret byte is selected randomly from secret fields depending upon the key. That provides additional protection of the secret data. Also, each share has some bytes missing and these missing ...

متن کامل

Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary ...

متن کامل

Image Encryption Technique based on the Entropy Value of a Random Block

The use of digital images in most fields of information technology systems makes these images usually contain confidential information. When these images transmitted via the Internet especially in the Cloud, it becomes necessary to protect these images in a way that ensure putting the confidential information that are contained far away from the attackers. A proposed image encryption technique ...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012