Abstract
A new scheme of password/key distribution, or secret sharing, is presented. Its cryptographic strength is based on the integer factorization problem. It realizes the idea of a threshold scheme in which distributed trust or shared control is ensured by gating a critical action on cooperation by t of n users, with l<t<n. A secret passphrase or a private key is divided into pieces, called ‘shares’, which are distributed and stored between n users or n networked computers in such a way that pooling shares of at least t users enables reconstruction of the original password/key. We provide an elementary introduction illustrated with one of the simplest known protocols based on modular arithmetic, the Chinese Remainder Theorem and Euclid’s Algorithm computing the greatest common divisor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cormen T.H., Leiserson C.E., Rivest R.L.: Introduction to algorithms, The MIT Press, 1990.
Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Robust Threshold DSS signatures, http://theory.lcs.mit.edu/~cis/pubs/stasio/dss-full.ps.gz.
Grzegorczyk A.: Zarys arytmetyki teoretycznej, Biblioteka Matematyczna, tom 39, WNT, Warszawa 1971.
Koblitz N.: A course in number theory and cryptography, Springer-Verlag, 1994.
Menezes A. J., van Oorschot P.C., Vanstone S.A.: Handbook of applied cryptography, CRC Press, 1996; http://www.cacr.math.uwaterloo.ca/hac/. 5th printing, August 2001.
Narkiewicz W.: Teoria liczb, Biblioteka Matematyczna, tom 50, PWN, Warszawa 1977.
Denning D.E.R.: Cryptography and data security, Addison Wesley, 1983.
Shamir A.: How to share a secret, Communications of the ACM 22(1979), pp. 612–613.
Sierpiński W.:Arytmetyka teoretyczna, PWN, 1959.
Stinson D.R.: Cryptography: theory and practice, CRC Press, 1995.
Geist A., Beguelin A., Dongarra J., Jiang W., Manchek R. and Sunderam V.: PVM-Parallel Virtual Machine, MIT Press, 1994.
MPI Forum: MPI — A message passing interface standard, Int. Journal Supercomputer Application 8(3/4)(1994), pp. 165–416.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Dobrzański, W., Soroczuk, A., Srebrny, M., Srebrny, M. (2002). Distributed Password. In: Sołdek, J., Pejaś, J. (eds) Advanced Computer Systems. The Springer International Series in Engineering and Computer Science, vol 664. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-8530-9_33
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8530-9_33
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-4635-7
Online ISBN: 978-1-4419-8530-9
eBook Packages: Springer Book Archive