Skip to main content

Distributed Password

  • Chapter
Advanced Computer Systems

Abstract

A new scheme of password/key distribution, or secret sharing, is presented. Its cryptographic strength is based on the integer factorization problem. It realizes the idea of a threshold scheme in which distributed trust or shared control is ensured by gating a critical action on cooperation by t of n users, with l<t<n. A secret passphrase or a private key is divided into pieces, called ‘shares’, which are distributed and stored between n users or n networked computers in such a way that pooling shares of at least t users enables reconstruction of the original password/key. We provide an elementary introduction illustrated with one of the simplest known protocols based on modular arithmetic, the Chinese Remainder Theorem and Euclid’s Algorithm computing the greatest common divisor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cormen T.H., Leiserson C.E., Rivest R.L.: Introduction to algorithms, The MIT Press, 1990.

    Google Scholar 

  2. Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Robust Threshold DSS signatures, http://theory.lcs.mit.edu/~cis/pubs/stasio/dss-full.ps.gz.

    Google Scholar 

  3. Grzegorczyk A.: Zarys arytmetyki teoretycznej, Biblioteka Matematyczna, tom 39, WNT, Warszawa 1971.

    Google Scholar 

  4. Koblitz N.: A course in number theory and cryptography, Springer-Verlag, 1994.

    Google Scholar 

  5. Menezes A. J., van Oorschot P.C., Vanstone S.A.: Handbook of applied cryptography, CRC Press, 1996; http://www.cacr.math.uwaterloo.ca/hac/. 5th printing, August 2001.

    Google Scholar 

  6. Narkiewicz W.: Teoria liczb, Biblioteka Matematyczna, tom 50, PWN, Warszawa 1977.

    Google Scholar 

  7. Denning D.E.R.: Cryptography and data security, Addison Wesley, 1983.

    Google Scholar 

  8. Shamir A.: How to share a secret, Communications of the ACM 22(1979), pp. 612–613.

    Article  MathSciNet  MATH  Google Scholar 

  9. Sierpiński W.:Arytmetyka teoretyczna, PWN, 1959.

    Google Scholar 

  10. Stinson D.R.: Cryptography: theory and practice, CRC Press, 1995.

    Google Scholar 

  11. Geist A., Beguelin A., Dongarra J., Jiang W., Manchek R. and Sunderam V.: PVM-Parallel Virtual Machine, MIT Press, 1994.

    Google Scholar 

  12. MPI Forum: MPI — A message passing interface standard, Int. Journal Supercomputer Application 8(3/4)(1994), pp. 165–416.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jerzy Sołdek Jerzy Pejaś

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Dobrzański, W., Soroczuk, A., Srebrny, M., Srebrny, M. (2002). Distributed Password. In: Sołdek, J., Pejaś, J. (eds) Advanced Computer Systems. The Springer International Series in Engineering and Computer Science, vol 664. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8530-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-8530-9_33

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-4635-7

  • Online ISBN: 978-1-4419-8530-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics