Skip to main content

Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography

  • Conference paper
Global Trends in Computing and Communication Systems (ObCom 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 269))

Included in the following conference series:

Abstract

In this paper a secured secret sharing scheme has been proposed where the dealer (who distribute shared secrets among the participants and reconstruct the shared secret key) is verified using zero knowledge proof concept by the participants. To protect authenticity of the participants and confidentiality of the secret shares being transferred through the network a signcryption scheme based on elliptic curve cryptography (ECC) which incorporates both the digital signature and encryption scheme in a logical single step is used. It reduces computational cost and communication overhead. As we are using elliptic curved-based zero-knowledge proof, it provides privacy and security more than other existing techniques. The improvement of security is due to the complexity of solving the discrete logarithm problem over elliptic curves.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  2. Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227–233 (1998)

    Article  MathSciNet  Google Scholar 

  3. Feldman, P.: A Practical Scheme for Non-interactive Verifiable Secret Sharing. In: Proc. IEEE Symp. Foundations of Computer Science, pp. 427–437 (1987)

    Google Scholar 

  4. Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  5. Han, Y., Yang, X., Sun, J., Li, D.: Verifiable Threshold Cryptosystems Based on Elliptic Curve. In: Proc. of ICCNMC 2003, pp. 334–337. IEEE Computer Society (2003)

    Google Scholar 

  6. Peng, C., Li, X.: Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing. IEEE (2005)

    Google Scholar 

  7. Chao, Qun, Fen: An improved authenticated (T,N) threshold , signature encryption scheme based on ECC. IEEE (2006)

    Google Scholar 

  8. Basu, A., Sengupta, I.: Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption (2010)

    Google Scholar 

  9. Cao, Z.-F., Li, J.-G., Li, J.-Z.: A new (t, n) threshold signature encryption scheme with specified receiver. Journal of China Institute Communications 24(5), 8–12 (2003)

    MathSciNet  Google Scholar 

  10. Dai, Y.-J., Yang, C.: (t, n) threshold signature encryption scheme base on elliptic curve cryptosystem. Application Research of Computer 21(9), 142–146 (2004)

    MathSciNet  Google Scholar 

  11. Stinson, D.: Cryptography: Theory and Practice

    Google Scholar 

  12. Almuhammadi, S., Sui, N.T., McLeod, D.: Better Privacy and Security in E-Commerce: Using Elliptic Curve-Based Zero-Knowledge Proofs. In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), pp. 299–302 (2004)

    Google Scholar 

  13. Almuhammadi, S., Neuman, C.: Security and Privacy Using One-Round Zero-Knowledge Proofs. In: 2005 IEEE International Conference on E-Commerce Technology (CEC 2004) (2005)

    Google Scholar 

  14. Han, Y., Yang, X., Hu, J.: Threshold signcryption based on elliptic curve (IEEE). IEEE (2009)

    Google Scholar 

  15. Zheng, Y.L.: Signcryption and Its Application in Efficient Public Key Solutions. In: Proceedings of Information Security Workshop, pp. 201–218 (1997)

    Google Scholar 

  16. Dai, Y., Yang, C.: A (t,n) threshold signcryption scheme based on ECC. Aplication Research of Computers 9, 142–143, 146 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sardar, A., Y.V., S.R., N., R. (2012). Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29219-4_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29218-7

  • Online ISBN: 978-3-642-29219-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics