CFP last date
20 January 2025
Reseach Article

Shared Cryptography with Embedded Session Key for Secret Audio

by Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 8
Year of Publication: 2011
Authors: Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri
10.5120/3128-4305

Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri . Shared Cryptography with Embedded Session Key for Secret Audio. International Journal of Computer Applications. 26, 8 ( July 2011), 5-9. DOI=10.5120/3128-4305

@article{ 10.5120/3128-4305,
author = { Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri },
title = { Shared Cryptography with Embedded Session Key for Secret Audio },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 8 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number8/3128-4305/ },
doi = { 10.5120/3128-4305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:12:14.213659+05:30
%A Prabir Kr. Naskar
%A Hari Narayan Khan
%A Ujjal Roy
%A Ayan Chaudhuri
%A Atal Chaudhuri
%T Shared Cryptography with Embedded Session Key for Secret Audio
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 8
%P 5-9
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared cryptography becomes more popular. Here we are suggesting a novel secret sharing scheme which employs simple graphical masking method, performed by simple ANDing for share generation and reconstruction can be done by performing simple ORing the qualified set of legitimate shares. Not only that, the generated shares are compressed and each share contains partial secret information, that leads to added protection to the secret and reduced bandwidth requirement for transmission.

References
  1. A. Shamir: “How to share a secret ?” Comm ACM, 22(11):612-613, 1979.
  2. G. Blakley : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  3. C. Asmuth and J. Bloom :”A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):208-210, 1983.
  4. Y. Desmedt “Some recent research aspects of threshold cryptography” Proc of ISW’97 1st International Information Security Workshop vol.1196 of LNCS paper 158-173 Springer-Verlag 1997.
  5. Y. Desmedt and Y. Frankel “Threshold cryptosystems” Proc of CRYPTO’89 volume 435 of LNCS, paper 307-315 Springer Verlag 1990.
  6. Y. Desmedt and Y. Frankel “Shared generation of authenticators and signatures” Proc. of CRYPTO’91 volume 576 of LNCS pages 457-469 Springer Verlag 1992.
  7. Y. Desmedt and Y. Frankel “Homomorphic zero knowledge threshold schemes over any finite abelian group” SIAM journal on Discrete Mathematics 7(4): 667-675, 1994.
  8. H. F. Hua ng and C.C. Chang “A novel efficient (t, n) threshold proxy signature scheme” Information Sciences 176(10): 1338-1349, 2006.
  9. A. De Santis, Y. Desmedt,Y. Frankel and M. Yung “How to share a function securely ?” In proc of STOC 94, paper 522-533, 1994.
  10. V. Shoup “Practical threshold signatures” In Proc of Eurocrypt 2000. volume 1807 of LNCS paper 207-220, Springer-Verlag 2000.
  11. Bozkurt, Kaya, Selcuk, Guloglu “Threshold Cryptography Based on Blakely Secret Sharing” Information Sciences.
  12. K. Kaya and A. A. Selcuk “Threshold Cryptograhy based on Asmuth-Bloom Secret Sharing” Information Sciences 177(19) 4148-4160, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Threshold Cryptography Audio sharing Compression Perfect Secret Sharing (PSS)