Title :
A (t;w) threshold scheme over insecure channels
Author :
Chiewthanakul, Bhichate ; Darath, Nattayanee ; Wanapongtipakorn, Supawadee
Author_Institution :
Dept. of Comput. Eng., Khon Kaen Univ., Khon Kaen, Thailand
Abstract :
Secret sharing schemes can be used to facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques; opening bank vaults), by gating the critical action on cooperation by t of w users. The disadvatages of these schemes are ineffective key management and in parties communication, the share secret keys must remain secret at both end. In this paper, we propose a method to exchange a Shamir´s secret sharing over insecure channels to overcome these disadvantages. The algorithm complexity analysis shows that it is an efficient scheme in both space and time for constructing the share secret keys, recovering the message M from the threshold t of w people and encrypting the share secret keys. Since there is no efficient algorithm known of recovering pairs of share secret key (xi, yi) from corresponding ciphertext ci, given the public information (ni, ei) of each person. Therefore, this scheme can be achieved the high security through the insecure communication channels.
Keywords :
cryptography; Shamir secret sharing; algorithm complexity analysis; communication channels; insecure channels; public information; threshold scheme; Cryptography;
Conference_Titel :
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2011 8th International Conference on
Conference_Location :
Khon Kaen
Print_ISBN :
978-1-4577-0425-3
DOI :
10.1109/ECTICON.2011.5947815