Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

نویسنده

  • Adnan Memon
چکیده

This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on a cell phone or a device using secret sharing scheme. The ideas for classical systems may also be applied to quantum schemes. Introduction A trusted third party (TTP) can be defined as an entity which is trusted by both parties to facilitate communication. Imagine a scenario in which two parties completely trust the TTP and use it to exchange secrets, but it is compromised or it becomes dishonest, then the system’s security will be completely broken. Thus, relying on a single trusted party is risky [1]. We can use two TTPs to reduce the risk and increase security, and in this paper we describe a protocol to distribute the secret shares using two TTPs to eliminate the dependency on single trusted third party in case it is compromised or becomes malicious. Imagine a cell phone or a device with sensitive information which may be a threat to national security is in the custody of law enforcing agency but they cannot access it because it is password protected and the data wipes out automatically if the wrong password is entered few times. The cell phone or device owner company has also refused to provide any backdoor for information to be accessed stating the reason that the backdoor may come in wrong hands and hence the security of phones or devices in someone’s physical ownership may be compromised. This in fact was what happened in the case between FBI and Apple a few months ago. Keeping such scenarios in mind, the use of secret sharing scheme becomes logical. In this paper, we present a protocol in which the cell phone data or device data is accessible to law

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography

The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond ha...

متن کامل

Secure communication with secret sharing for the S-Network using a large set of mistrust-parties

This article presents a solution to ensure secure communication in computer networks by using secret sharing and multiple parties mistrusting each other instead of relying on a “trusted party” or a “web of trust”. In contrast to other solutions requiring asymmetric encryption, this concept can provide security even after any possible advance in cryptanalysis and even if unlimited calculation po...

متن کامل

Key Escrow in Mutually Mistrusting Domains

In this paper we present a key escrow system which meets possible requirements for international key escrow, where diierent domains may not trust each other. In this system multiple third parties, who are trusted collectively but not individually, perform the dual role of providing users with key management services and providing autho-rised agencies in the relevant domains with warranted acces...

متن کامل

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...

متن کامل

A Novel Fair GSR Contract Signing Protocol Against Earnest Money

In this paper we propose a novel Fair Gradual Secrete Release (GSR) protocol for E-contract signing against earnest money between an originator and a responder involving their banks as transacting parties. We provide a security analysis of the protocol and analyze some important and pertinent properties of the protocol, which include money atomicity, validated contract and the fairness in true ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1608.05097  شماره 

صفحات  -

تاریخ انتشار 2016