Abstract
This research objective is to introduce how the secret sharing algorithm was used to increase the security of your data before distributing to the database. The first arbitrated polynomial function was transformed to be another one in order to enhance more security. Plaintext was reconstructed by reversing two stages interpolation. This algorithm improves more security than ordinary share secret sharing algorithm.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Blakley, G.R.: Safeguarding cryptographic keys, p. 313. International Workshop on Managing Requirements Knowledge. IEEE Computer Society (1899)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Al-Ssulami, A.M.: A novel threshold secret sharing scheme using FFT algorithm. Int. J. Inf. Secur. Sci. 2, 19–27 (2013)
Dahlia M.: Secret sharing, Lecture in an advance course in computer and network security. The Hebrew University of Jerusalem (2004)
Weisstein, E.W., Branden, A.: Lagrange interpolating polynomial—from Wolfram MathWorld, http://mathworld.wolfram.com/LagrangeInterpolatingPolynomial.html
Zobel, E.A.: Function transformations | zona land education. http://zonalandeducation.com/mmts/functionInstitute/functionTransformations/functionTransformations.html
Jones, J.: Shifting, reflecting, and stretching graphs. https://people.richland.edu/james/lecture/m116/functions/translations.html
Wortman, K.: Graph transformations. In: Math 1050. http://www.math.utah.edu/~wortman/1050/
Johnson, J.: Parent functions and transformations—she loves math. http://www.shelovesmath.com/algebra/advanced-algebra/parent-graphs-and-transformations/
Senanayake, K.: What I’m learning: Adi Shamir’s secret sharing scheme. http://mytechnicaldocs.blogspot.jp/2011/09/how-to-share-secret.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Sridokmai, T., Prakancharoen, S., Porrawatpreyakorn, N. (2016). Transformation Polynomial Secret Sharing. In: Sulaiman, H., Othman, M., Othman, M., Rahim, Y., Pee, N. (eds) Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, vol 362. Springer, Cham. https://doi.org/10.1007/978-3-319-24584-3_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-24584-3_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24582-9
Online ISBN: 978-3-319-24584-3
eBook Packages: EngineeringEngineering (R0)