CFP last date
20 January 2025
Reseach Article

Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

by Prabir Kr. Naskar, Hari Narayan Khan, Ayan Chaudhuri, Atal Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 7
Year of Publication: 2011
Authors: Prabir Kr. Naskar, Hari Narayan Khan, Ayan Chaudhuri, Atal Chaudhuri
10.5120/2375-3129

Prabir Kr. Naskar, Hari Narayan Khan, Ayan Chaudhuri, Atal Chaudhuri . Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique. International Journal of Computer Applications. 19, 7 ( April 2011), 12-15. DOI=10.5120/2375-3129

@article{ 10.5120/2375-3129,
author = { Prabir Kr. Naskar, Hari Narayan Khan, Ayan Chaudhuri, Atal Chaudhuri },
title = { Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 7 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume19/number7/2375-3129/ },
doi = { 10.5120/2375-3129 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:21.151776+05:30
%A Prabir Kr. Naskar
%A Hari Narayan Khan
%A Ayan Chaudhuri
%A Atal Chaudhuri
%T Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 7
%P 12-15
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary the key cannot be reconstructed unless a predefined set of shares are been accumulated. The earlier schemes available in literature lead to high computational complexity during both sharing and reconstructing. Here we are suggesting a scheme which employs simple graphical masking method, done by simple ANDing for share generation and reconstruction can be done by simple ORing the qualified set of shares. We are proposing to append secret sharing technique along with conventional cryptography technique for key management to make key management more robust mainly against the chance of compromise and single point failure. Nevertheless it confirms authenticity, confidentiality, non-repudiation and integrity as well.

References
  1. A. Shamir: “How to share a secret ?” Comm ACM, 22(11):612-613, 1979.
  2. G. Blakley : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  3. C. Asmuth and J. Bloom :”A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):208-210, 1983.
  4. Y. Desmedt “Some recent research aspects of threshold cryptography” Proc of ISW’97 1st International Information Security Workshop vol.1196 of LNCS paper 158-173 Springer-Verlag 1997.
  5. Y. Desmedt and Y. Frankel “Threshold cryptosystems” Proc of CRYPTO’89 volume 435 of LNCS, paper 307-315 Springer Verlag 1990.
  6. Y. Desmedt and Y. Frankel “Shared generation of authenticators and signatures” Proc. of CRYPTO’91 volume 576 of LNCS pages 457-469 Springer Verlag 1992.
  7. Y. Desmedt and Y. Frankel “Homomorphic zero knowledge threshold schemes over any finite abelian group” SIAM journal on Discrete Mathematics 7(4): 667-675, 1994.
  8. H. F. Hua ng and C.C. Chang “A novel efficient (t, n) threshold proxy signature scheme” Information Sciences 176(10): 1338-1349, 2006.
  9. A. De Santis, Y. Desmedt,Y. Frankel and M. Yung “How to share a function securely ?” In proc of STOC 94, paper 522-533, 1994.
  10. V. Shoup “Practical threshold signatures” In Proc of Eurocrypt 2000. volume 1807 of LNCS paper 207-220, Springer-Verlag 2000.
  11. Bozkurt, Kaya, Selcuk, Guloglu “Threshold Cryptography Based on Blakely Secret Sharing” Information Sciences.
  12. K. Kaya and A. A. Selcuk “Threshold Cryptograhy based on Asmuth-Bloom Secret Sharing” Information Sciences 177(19) 4148-4160, 2007
Index Terms

Computer Science
Information Sciences

Keywords

Shared cryptography Key management Message digest RSA Crypto system