INTERACTIVE SECRET SHARE MANAGEMENT

Constantin Catalin Dragan

2009

Abstract

In this paper, we have proposed a method for the management of a compartmented secret sharing scheme that allows the increase of the global threshold without modifying the existent shares of the participants. We have considered the Trusted Authority the central point of the scheme as a management unit: it creates the shares, in a RSA manner, and distributes them, rebuilds the secret S , and allows the registration of new participants without modifying the existing shares.

References

  1. Blakley, B., Blakley, G. R., Chan, A. H., and Massey, J. L. (1993). Threshold schemes with disenrollment. In Advances in Cryptology - CRYPTO 92, volume 740 of Lecture Notes in Computer Science, pages 540-548. Springer-Verlag.
  2. DeLaurentis, J. M. (1984). A further weakness in the common modulus protocol for the rsa cryptoalgorithm. Cryptologia, 8(3).
  3. Ghodosi, H., Pieprzyk, J., and Safavi-Naini, R. (1998). Secret sharing in multilevel and compartmented groups. Lecture Notes in Computer Science, 1438:367-378.
  4. Iftene, S. (2007). Secret Sharing Schemes with Applications in Security Protocols. PhD thesis, ”Al.I.Cuza” University of Iasi, Iasi, Romania.
  5. Ito, M., Saito, A., and Nishizeki, T. (1987). Secret sharing scheme realizing general access structure. In IEEE Global Telecommunications Conference: Globecom 87, pages 99-102. IEEE Press.
  6. Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A. (1998). Handbook of Applied Cryptography. CRC Press, volume 6 of discrete mathematics and its applications edition.
  7. Shamir, A. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2):120-126.
  8. Shamir, A. (1979). How to share a secret. Communications of the Association for Computing Machinery, 22(11):612-613.
  9. Simmons, G. J. (1983). A 'weak' privacy protocol using the rsa cryptoalgorithm. Cryptologia, 7(2).
  10. Simmons, G. J. (1990). How to (really) share a secret. In Advances in Cryptology - CRYPTO 88, volume 403 of Lecture Notes in Computer Science, pages 390-448. Springer-Verlag.
Download


Paper Citation


in Harvard Style

Catalin Dragan C. (2009). INTERACTIVE SECRET SHARE MANAGEMENT . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 266-269. DOI: 10.5220/0002226702660269


in Bibtex Style

@conference{secrypt09,
author={Constantin Catalin Dragan},
title={INTERACTIVE SECRET SHARE MANAGEMENT},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={266-269},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002226702660269},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - INTERACTIVE SECRET SHARE MANAGEMENT
SN - 978-989-674-005-4
AU - Catalin Dragan C.
PY - 2009
SP - 266
EP - 269
DO - 10.5220/0002226702660269