首页    期刊浏览 2025年02月22日 星期六
登录注册

文章基本信息

  • 标题:A Novel Way of Providing Confidentiality to Shared Secret Key and Authenticate the Shares During Reconstruction
  • 本地全文:下载
  • 作者:P. Devaki ; G.Rghavendra Rao
  • 期刊名称:Computer Science & Information Technology
  • 电子版ISSN:2231-5403
  • 出版年度:2012
  • 卷号:2
  • 期号:3
  • 页码:331-338
  • DOI:10.5121/csit.2012.2332
  • 出版社:Academy & Industry Research Collaboration Center (AIRCC)
  • 摘要:If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the other users. So this can protect the important information and also protect the key by sharing. If the key is not shared, then always there may be a threat of key being compromised intentionally or unintentionally. If the key is shared among the authorized users, at the time of requirement to use the information, few authorized users can use their shares to reconstruct the key and use it. This avoids the drawbacks of the single user having the key. Also it is necessary to authenticate the shares given by the users during reconstruction of the key. This facilitates the verification of the modified shares or fake shares sent by the authorized or unauthorized users. To achieve the confidentiality of the key we are using the threshold secret sharing method where the key will be divided in to number of shares depending on the number of authorized users and represent those shares in Braille format, and to provide authentication we are using SHA-1 algorithm. The key can be text data, image.
  • 关键词:Authentication; Braille format; Bitmap image; Confidentiality; Multiple keys; Secret key; Secret ;sharing.
国家哲学社会科学文献中心版权所有