Generalized secret sharing (original) (raw)

Key management with cryptography

Growing number of business operations conducted via Internet or using a network environment for exchanging private messages requires increasing means for providing security and privacy of communication acts. Cryptography techniques are essential component of any secure communication.Two main cryptography systems are used today: symmetric systems called also systems with a secret key,and public-key systems. An extensive overview of currently known or emerging cryptography techniques used in both type of systems can be found in [ 121. One of such a

Two-way Mechanism to Enhance Confidentiality and Accuracy of Shared Information

International Journal of Electrical and Computer Engineering (IJECE), 2016

As such internet and information technology have influenced the human life significantly thus the current technology cannot solely assure the security of shared information. Hence, to fulfil such requirements mass amount of research have been undertaken by various researchers among which one of the mechanisms is the use of dynamic key rather than static one. In this regard, we have proposed a method of key generation to provide the dynamic keys. The scheme not only can change the key but also provide the error control mechanism. At the end of this paper, a comparison with the existing techniques has also been made to prove the efficiency of the proposed scheme.

A Survey: Secret Sharing

International Journal of Advance Engineering and Research Development, 2016

In the 21 st century, technology is omnipresent in our lives. Widespread a rapid increase in number of data and the growth of communication technologies have enabled collaborative computations among multi parties. Preserving privacy of data owned by parties is becoming crucial day by day. So, security is the main issue in multi party communication. Secret sharing is one of the approaches for this secure communication. Secret sharing is a technique to securely share information between multiple parties. Secret is divided into pieces, distribute among parties, and recovered by an authorized set of parties. Various secret sharing techniques have been developed to secure data. The intent of this paper is to hold a review of different secret sharing schemes.

Practical and provably secure release of a secret and exchange of signatures

Journal of Cryptology, 1995

We present a protocol that allows a sender to gradually and verifiably release a secret to a receiver. We argue that the protocol can be efficiently applied to exchange secrete in many cmw, for example when the secret is a digital signature. This includes Rabin, low-publicexponent RSA, and El Gamal signatures. In these cases, the protocol requires an interactive bpass initial phase, after which each bit (or block of bits) of the signature can be released non-interactively (i.e. by sending 1 message). The necessary computations can be done in a few seconds on an uptedate PC. The protocol is statistical zersknowledge, and therefore releasea a negligible amount of aide information in the Shannon Benae to the receiver. The sender is unable to cheat, if he cannot factor a large compoaite number before the protocol is completed. We also point out a simple method by which any type of signatures can be applied to fair contract signing using only one signature.

New Directions in Cryptography Invited Paper

Two kinds of contemporary developments in cryp-communications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocessraphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key distribution one else. This is done by sending the key in advance over some channels and supply the equivalent of a written signature. This secure channel such a private courier or registered mail. A paper suggests ways to solve these currently open problems. private conversation between two people with no prior acquain-It also discusses how the theories of communication and computance is a common occurrence in business, however, and it is tation are beginning to provide the tools to solve cryptographic unrealistic to expect initial business contacts to be postponed problems of long standing.

A NOVEL WAY OF VERIFIABLE REDISTRIBUTION OF THE SECRET IN A MULTIUSER ENVIRONMENT USING GROUP KEY

Shamir's threshold secret sharing is one of the mechanisms to distribute the shares of a secret to a group of authorized users called access structure (m, n). But the group members may change based on the organizations needs. This change of access structure requires the redistribution of the shares of that secret to the new members of that group (m', n'). In this paper we are proposing a method to distribute without using a private channel. Also redistribute the shares of a secret on change in the access structure. The redistribution does not involve the members of the old access structure. It is also proposed to verify the shares and also the reconstructed secret by each and every member of the group.

Copyright: 2009, Common Ground Publishing Certificate-based Signatures Revisited1

2016

Abstract: Certificate-based encryption was introduced in Eurocrypt’03 to solve the certificate management problem in public key encryption. Recently, this idea was ex-tended to certificate-based signatures. Several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first take a closer look at the certificate-based signature by comparing it with digital signatures in other popular public key systems. We introduce a new security model of certificate-based signature, which defines several new types of adversaries against certificate-based sig-natures, along with the security model of certificate-based signatures against them. The new model is clearer and more elaborated compared with other existing ones. We then investigate the relationship between certificate-based signatures and certificate-less signatures, and propose a generic construction of certificate-based signatures. We prove that the generic construction is secure (in the ran...

A Secure Designated Signature Scheme

Annotation: This paper presents a threshold designated receiver signature scheme that includes certain characteristic in which the signature can be verified by the assistance of the signature recipient only. The aim of the proposed signature scheme is to protect the privacy of the signature recipient. However, in many applications of such signatures, the signed document holds data which is sensitive to the recipient personally and in these applications usually a signer is a single entity but if the document is on behalf of the company the document may need more than one signer. Therefore, the threshold technique is employed to answer this problem. In addition, we introduce its use to shared signature scheme by threshold verification. The resultant scheme is efficient and dynamic.