DocumentCode :
538402
Title :
Hybrid secret key escrow mechanisms as counters
Author :
Hyytiä, Esa
Author_Institution :
Telecommun. Res. Center Vienna (ftw.), Vienna, Austria
fYear :
2009
fDate :
20-22 May 2009
Firstpage :
1
Lastpage :
8
Abstract :
Many of the cryptographic primitives can be used in several ways. One interesting application of the Shamir´s secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been observed [1]. In the proposed system, a so-called front-end component encrypts the monitored data traffic, which is then stored at the back-end. At the same time, the front-end analyzes the traffic, and if suspicious packets are observed, this is indicated to the back-end by revealing one share of the corresponding encryption key. Once m suspicious events have been detected, the back-end can disclose the secret key, decrypt the particular traffic flow, and carry out further investigations. In this paper we study the secret sharing scheme as a counter at the limit when the threshold m is relatively large. We first analyze how the scheme behaves as m approaches the maximum possible value of p - 1, where p is a prime number (design parameter). Then, we also analyze a probabilistic version developed to overcome the limited counting range, or excessive reporting overhead, by revealing shares only with a certain probability after each event, and provide expressions describing the resulting inaccuracy from the introduced randomness. Finally, we also propose a hybrid solution to mitigate the otherwise detoriating performance by using a forward error correction scheme similar to LT codes to encode the shared secret revealing process.
Keywords :
forward error correction; private key cryptography; probability; telecommunication security; telecommunication traffic; LT code; counter; cryptography; encryption key; forward error correction; front-end component encryption; hybrid secret key Escrow mechanism; privacy aware traffic monitoring; probability; secret sharing scheme; Cryptography; IP networks; Markov processes; Monitoring; Polynomials; Radiation detectors; Random variables;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Communication Networks (IWSCN), 2009 Proceedings of the 1st International Workshop on
Conference_Location :
Trondheim
Print_ISBN :
978-1-61284-168-7
Electronic_ISBN :
978-82-997105-1-0
Type :
conf
Filename :
5683057
Link To Document :
بازگشت