{"title":"基于计数的秘密共享的可靠密钥生成","authors":"Adel D. Al-qurashi, A. Gutub","doi":"10.20967/JCSCM.2018.04.006","DOIUrl":null,"url":null,"abstract":"Secret sharing scheme is becoming famous for increasing the security to access sensitive information for applications and resources that have to be protected by more than one person. It divides the secret key into shares, distributed to participants such that only subsets of participants can reconstruct the secret key. This paper adopts counting-based secret sharing scheme as a promising secret sharing technique presented recently. This counting-based method works on constructing shares by changing one or two 0-bits within the secret key to one at different locations for producing needed shares. The combination of selected shares is counting the ones in parallel to recover the secret key. This paper proposed improving the reliability of this counting-based secret sharing scheme by increasing the size of the secret key to 64-bits as realistically needed by most applications. The work also improved the security of the secret key affecting its shares by adjusting the generation algorithm to involve applicable statistical randomness tests from NIST 800-22 standard where any unreliable secret key is regenerated again whenever needed. The proposal is implemented and compared with the original scheme via Java platform modeling showing interesting practical remarks providing remarkable contributions.","PeriodicalId":374608,"journal":{"name":"Journal of Computer Science & Computational Mathematics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"Reliable Secret Key Generation For Counting-Based Secret Sharing\",\"authors\":\"Adel D. Al-qurashi, A. Gutub\",\"doi\":\"10.20967/JCSCM.2018.04.006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing scheme is becoming famous for increasing the security to access sensitive information for applications and resources that have to be protected by more than one person. It divides the secret key into shares, distributed to participants such that only subsets of participants can reconstruct the secret key. This paper adopts counting-based secret sharing scheme as a promising secret sharing technique presented recently. This counting-based method works on constructing shares by changing one or two 0-bits within the secret key to one at different locations for producing needed shares. The combination of selected shares is counting the ones in parallel to recover the secret key. This paper proposed improving the reliability of this counting-based secret sharing scheme by increasing the size of the secret key to 64-bits as realistically needed by most applications. The work also improved the security of the secret key affecting its shares by adjusting the generation algorithm to involve applicable statistical randomness tests from NIST 800-22 standard where any unreliable secret key is regenerated again whenever needed. The proposal is implemented and compared with the original scheme via Java platform modeling showing interesting practical remarks providing remarkable contributions.\",\"PeriodicalId\":374608,\"journal\":{\"name\":\"Journal of Computer Science & Computational Mathematics\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Science & Computational Mathematics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.20967/JCSCM.2018.04.006\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science & Computational Mathematics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20967/JCSCM.2018.04.006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reliable Secret Key Generation For Counting-Based Secret Sharing
Secret sharing scheme is becoming famous for increasing the security to access sensitive information for applications and resources that have to be protected by more than one person. It divides the secret key into shares, distributed to participants such that only subsets of participants can reconstruct the secret key. This paper adopts counting-based secret sharing scheme as a promising secret sharing technique presented recently. This counting-based method works on constructing shares by changing one or two 0-bits within the secret key to one at different locations for producing needed shares. The combination of selected shares is counting the ones in parallel to recover the secret key. This paper proposed improving the reliability of this counting-based secret sharing scheme by increasing the size of the secret key to 64-bits as realistically needed by most applications. The work also improved the security of the secret key affecting its shares by adjusting the generation algorithm to involve applicable statistical randomness tests from NIST 800-22 standard where any unreliable secret key is regenerated again whenever needed. The proposal is implemented and compared with the original scheme via Java platform modeling showing interesting practical remarks providing remarkable contributions.