DocumentCode :
2185301
Title :
A (t;w) threshold scheme over insecure channels
Author :
Chiewthanakul, Bhichate ; Darath, Nattayanee ; Wanapongtipakorn, Supawadee
Author_Institution :
Dept. of Comput. Eng., Khon Kaen Univ., Khon Kaen, Thailand
fYear :
2011
fDate :
17-19 May 2011
Firstpage :
232
Lastpage :
235
Abstract :
Secret sharing schemes can be used to facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques; opening bank vaults), by gating the critical action on cooperation by t of w users. The disadvatages of these schemes are ineffective key management and in parties communication, the share secret keys must remain secret at both end. In this paper, we propose a method to exchange a Shamir´s secret sharing over insecure channels to overcome these disadvantages. The algorithm complexity analysis shows that it is an efficient scheme in both space and time for constructing the share secret keys, recovering the message M from the threshold t of w people and encrypting the share secret keys. Since there is no efficient algorithm known of recovering pairs of share secret key (xi, yi) from corresponding ciphertext ci, given the public information (ni, ei) of each person. Therefore, this scheme can be achieved the high security through the insecure communication channels.
Keywords :
cryptography; Shamir secret sharing; algorithm complexity analysis; communication channels; insecure channels; public information; threshold scheme; Cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2011 8th International Conference on
Conference_Location :
Khon Kaen
Print_ISBN :
978-1-4577-0425-3
Type :
conf
DOI :
10.1109/ECTICON.2011.5947815
Filename :
5947815
Link To Document :
بازگشت