• DocumentCode
    2185301
  • Title

    A (t;w) threshold scheme over insecure channels

  • Author

    Chiewthanakul, Bhichate ; Darath, Nattayanee ; Wanapongtipakorn, Supawadee

  • Author_Institution
    Dept. of Comput. Eng., Khon Kaen Univ., Khon Kaen, Thailand
  • fYear
    2011
  • fDate
    17-19 May 2011
  • Firstpage
    232
  • Lastpage
    235
  • Abstract
    Secret sharing schemes can be used to facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques; opening bank vaults), by gating the critical action on cooperation by t of w users. The disadvatages of these schemes are ineffective key management and in parties communication, the share secret keys must remain secret at both end. In this paper, we propose a method to exchange a Shamir´s secret sharing over insecure channels to overcome these disadvantages. The algorithm complexity analysis shows that it is an efficient scheme in both space and time for constructing the share secret keys, recovering the message M from the threshold t of w people and encrypting the share secret keys. Since there is no efficient algorithm known of recovering pairs of share secret key (xi, yi) from corresponding ciphertext ci, given the public information (ni, ei) of each person. Therefore, this scheme can be achieved the high security through the insecure communication channels.
  • Keywords
    cryptography; Shamir secret sharing; algorithm complexity analysis; communication channels; insecure channels; public information; threshold scheme; Cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2011 8th International Conference on
  • Conference_Location
    Khon Kaen
  • Print_ISBN
    978-1-4577-0425-3
  • Type

    conf

  • DOI
    10.1109/ECTICON.2011.5947815
  • Filename
    5947815