Cheater Detection Scheme for Dynamic Secret Key Generation
Keywords:
Secret Key, Cheater Detection, Cryptanalysis.Abstract
Any secret sharing scheme is considered to be strong if the complexity of cryptanalysis is very high. In cryptography the brutal attack is the type of attack in which all the possible keys of the algorithm are tried for obtaining the secret. Various types of cryptanalytic methods for a given scheme are compared with complexity of the brute force attack. If the complexity of various cryptanalytic attacks is of the same order as that of brute force attack, then the system is said to be computationally strong. In our method of dynamic multi-secret sharing the security analysis mainly depends upon the application of hash function to calculate C matrix and modular arithmetic over primitive element. In this paper, two methods are proposed which remove the need of secret share distribution by the dealer using secure channel and to find out the cheater in the group.
References
- Atul Kahate, Cryptography and network security, second edition, India: Tata McGraw-Hill.
- Shamir Adi, “How to share a secret”, Communication of ACM, vol. 22(11), pp. 612- 613, November 1979.
- Blakely G., “Safeguarding cryptographic keying”, In Proc. Of AFIPS, National computer conference, 1979.
- Lin Han-Yu and Yeh Yi-Shiung, “Dynamic Multi-Secret Sharing Scheme”, Int. J. Contemp. Math. Sciences, Vol. 3, no.1, pp. 37-42, 2008.
- William Stallings, Cryptography and Network Security, third edition, India: Pearson Education.
- Bogdnav Dan, “How to securely perform computation on secret share data” ,Master’s thesis, University of Tartu, 2007.
- Menezes, P. Oorschot, S. Vanstone, Handbook of applied cryptography, CRC Press.
- Hallberg, Networking a beginning guide, TMH.
- Diffie W., Hellman M., “New directions in cryptography”, IEEE Transactions, on Information Theory, IT-22 (6), pp. 644-654, 1976.
- He J., Dawson E., “Multistage secret sharing based on one-way function”, Electronics Letters, vol. 30 (19), pp. 1591-1592, 1994.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.