THE BLAKLEY BASED SECRET SHARING APPROACH

被引:0
作者
Calkavur, Selda [1 ]
Molla, Fatih [2 ]
机构
[1] Kocaeli Univ, Dept Math, Kocaeli, Turkey
[2] Kocaeli Univ, Informat Technol, Kocaeli, Turkey
来源
SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI | 2019年 / 37卷 / 02期
关键词
Secret sharing; threshold scheme; finite fields;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is also important. Imagine you encrypt your important files with are secret key and if such a key is lost, then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. In this paper we propose a new approach to construct Blakley's scheme by using the finite fields.
引用
收藏
页码:489 / 494
页数:6
相关论文
共 12 条
  • [1] Al Ebri N., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P40
  • [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
  • [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [4] Blakley G. R., 1994, Error Control, Cryptology, and Speech Compression. Workshop on Information Protection. Selected Papers, P33
  • [5] Bozkurt I.N., 2008, P INF SEC CRYPT 2008
  • [6] Chen CC, 2008, J INF SCI ENG, V24, P1567
  • [7] Csirmaz L., 2011, 2011174 CRYPT EPRINT
  • [8] Iftere S., 2007, 0701 TR U A CUZ IAS
  • [9] Martin K.M., 2008, P ROYAL FLEM AC BELG, P45
  • [10] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613