Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Implementation of Shamir’s Secret Sharing on Proactive Network

Saria Islam, A. S. M Mahmudul Hasan Published in Security

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
10.5120/ijais13-451003
Download full text
  1. Saria Islam and Mahmudul A S M Hasan. Article: Implementation of Shamirs Secret Sharing on Proactive Network. International Journal of Applied Information Systems 6(2):17-22, September 2013. BibTeX

    @article{key:article,
    	author = "Saria Islam and A. S. M Mahmudul Hasan",
    	title = "Article: Implementation of Shamirs Secret Sharing on Proactive Network",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 6,
    	number = 2,
    	pages = "17-22",
    	month = "September",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

For most cryptosystems, by using a single-system master key there is a need to protect many important encryption and decryption keys used to achieve data security. There are three major drawbacks under this single-master key arrangement. First, if the master key is disclosed to the public by accident, then the entire system has no secrecy at all. Second, if the master key is lost, then all the keys under protection become inaccessible. Third, if the owner of the master key becomes disloyal, then all important information becomes completely available to the opponents. The secret sharing scheme was designed to overcome these problems. Shamir's (t, n)-threshold scheme is one of the most well-known examples of secret sharing schemes which provides a very simple and efficient way to share a secret among any t of the n participants. The primary goal of our research is to study the terminology and protocols behind secret sharing schemes and implement Shamir's scheme using Java. In addition, we have also introduced a new scheme for extending the Shamir's scheme on proactive network.

Reference

  1. Fredrik Olsson, "A Lab System for Secret Sharing", 2004.
  2. N. Ferguson & B. Schneier. Practical Cryptography. 2003, pp. 358-360.
  3. R. Anderson, R. Needham & A. Shamir. "The Steganographic File System. " in D. Aucsmith (ed. ) Information Hiding. Second International Workshop. 1998, pp. 73-82.
  4. Lidong Zhou. Secret Sharing. Secret Sharing. Retrieved August 01, 2013, from http://www. cs. cornell. edu/courses/cs513/2000sp/SecretSharing. html
  5. Secret Sharing Scheme. Retrived Auguest 02, 2013, from http://www. jetico. com/web_help/bc8/html/08_1_new_key_generator/03_SSS. htm
  6. A. Shamir, How to share a secret, Communications of the ACM 22 (1979), 612-613.
  7. What is "Secret Sharing"? Retrived Auguest 02, 2013, from http://point-at-infinity. org/ssss/
  8. V. Nikov, S. Nikova. On Proactive Secret Sharing Schemes, SAC'04, LNCS 3357, 2004, pp. 314-331.

Keywords

Cryptography, Secret Sharing, Shamir's secret sharing scheme, Proactive Secret Sharing, Implementation of Shamir's Secret Sharing