Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability

被引:25
作者
AlKhodaidi, Taghreed [1 ]
Gutub, Adnan [2 ]
机构
[1] Umm Al Qura Univ, Comp Sci Dept Al Qunfudhah, Al Qunfudhah, Saudi Arabia
[2] Umm Al Qura Univ, Dept Comp Engn, Mecca, Saudi Arabia
关键词
Counting-based secret sharing; Information security; Sensitive security systems; Secret keys; Shares generation; Share key; THRESHOLD-CHANGEABILITY; SCHEME; SECURE; EFFICIENT;
D O I
10.1007/s13369-020-04422-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Sensitive information used online has resulted in the emergence of many security systems to be protected by secret keys. One of these security systems is the so-called secret sharing, in which certain key portions are distributed to allow sharing access by a specified number of participants. The sharing system requires that several users enter their shares, at the same time, to rebuild the main target key (TK) to access sensitive data within the system. Normally, the number of shares is limited by the number of zeros within TK as of our focus on the recent counting-based secret sharing strategy. If the number of participants is more than TK zeros, the complete system cannot work needing to reconsider regenerating TK again. In this work, we improved the original system of counting-based secret sharing to accommodate more participants via longer trustworthy TK selection. We proposed several possible models to enlarge the number of participants for applicable share's keys generated from TK. The trustworthy security randomness of the new shares and adjusted target keys were all measured to select the best choice based on standard reliability randomness test. The study experimented the proposal on typical simulations applied on different target keys applicable sizes. The results presented that the final target key TK created as having the highest ratio of randomness to be preferred choice proven secure and reliable to protect information within the system.
引用
收藏
页码:3403 / 3423
页数:21
相关论文
共 66 条
[1]   Polynomial differential-based strong (n, t, n)-verifiable secret sharing [J].
Al Mahmoud, Qassim .
IET INFORMATION SECURITY, 2013, 7 (04) :312-317
[2]   Security enhancement of shares generation process for multimedia counting-based secret-sharing technique [J].
Al-Ghamdi, Maimoona ;
Al-Ghamdi, Manal ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :16283-16310
[3]  
Al-Qurashi A., 2018, J COMPUTER SCI COMPU, V8, P87, DOI [10.20967/jcscm.2018.04.006, DOI 10.20967/JCSCM.2018.04.006]
[4]  
Alaseri K., 2018, IJRDO J COMPUTER SCI, V4, P1
[5]   Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications [J].
Alassaf, Norah ;
Gutub, Adnan .
INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) :1-15
[6]  
Alsaid A.Y., 2019, J. Forensic Res, V10, P1
[7]  
[Anonymous], 2016, IJCSET, V6, P138
[8]  
[Anonymous], 2006, Sci. Ann. Cuza Univ.
[9]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[10]  
Bassham 3rd LE, 2010, NIST SPECIAL PUBLICA