Abstract
In this paper a secured secret sharing scheme has been proposed where the dealer (who distribute shared secrets among the participants and reconstruct the shared secret key) is verified using zero knowledge proof concept by the participants. To protect authenticity of the participants and confidentiality of the secret shares being transferred through the network a signcryption scheme based on elliptic curve cryptography (ECC) which incorporates both the digital signature and encryption scheme in a logical single step is used. It reduces computational cost and communication overhead. As we are using elliptic curved-based zero-knowledge proof, it provides privacy and security more than other existing techniques. The improvement of security is due to the complexity of solving the discrete logarithm problem over elliptic curves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227–233 (1998)
Feldman, P.: A Practical Scheme for Non-interactive Verifiable Secret Sharing. In: Proc. IEEE Symp. Foundations of Computer Science, pp. 427–437 (1987)
Pedersen, T.P.: Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Han, Y., Yang, X., Sun, J., Li, D.: Verifiable Threshold Cryptosystems Based on Elliptic Curve. In: Proc. of ICCNMC 2003, pp. 334–337. IEEE Computer Society (2003)
Peng, C., Li, X.: Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing. IEEE (2005)
Chao, Qun, Fen: An improved authenticated (T,N) threshold , signature encryption scheme based on ECC. IEEE (2006)
Basu, A., Sengupta, I.: Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption (2010)
Cao, Z.-F., Li, J.-G., Li, J.-Z.: A new (t, n) threshold signature encryption scheme with specified receiver. Journal of China Institute Communications 24(5), 8–12 (2003)
Dai, Y.-J., Yang, C.: (t, n) threshold signature encryption scheme base on elliptic curve cryptosystem. Application Research of Computer 21(9), 142–146 (2004)
Stinson, D.: Cryptography: Theory and Practice
Almuhammadi, S., Sui, N.T., McLeod, D.: Better Privacy and Security in E-Commerce: Using Elliptic Curve-Based Zero-Knowledge Proofs. In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), pp. 299–302 (2004)
Almuhammadi, S., Neuman, C.: Security and Privacy Using One-Round Zero-Knowledge Proofs. In: 2005 IEEE International Conference on E-Commerce Technology (CEC 2004) (2005)
Han, Y., Yang, X., Hu, J.: Threshold signcryption based on elliptic curve (IEEE). IEEE (2009)
Zheng, Y.L.: Signcryption and Its Application in Efficient Public Key Solutions. In: Proceedings of Information Security Workshop, pp. 201–218 (1997)
Dai, Y., Yang, C.: A (t,n) threshold signcryption scheme based on ECC. Aplication Research of Computers 9, 142–143, 146 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sardar, A., Y.V., S.R., N., R. (2012). Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-29219-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29218-7
Online ISBN: 978-3-642-29219-4
eBook Packages: Computer ScienceComputer Science (R0)