Abstract
Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has been no research attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore, to design and implement a guideline that can assist in choosing such value. The experiment was setup to collecting and observing the time used in distribution and reconstruction process to optimize proper threshold value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21, 120–126 (1978)
Kerckhoffs, A.: La Cryptographie militaire. J. Des. Sci. Mil. 9, 5–83 (1883)
Sharmir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys, In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) Proceedings of the 1979 AFIPS National Computer Conference, AFIPS Conference Proceeding, vol. 48, pp. 313–317. AFIPS Press (1979)
Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology-CRYPTO’88. Lecture Notes in Computer Science, vol. 403, pp. 27–35. Springer (1990)
Bertilsson, M., Ingemarsson, I.: A construction of practical secret sharing schemes using linear block codes. In: Seberry, J., Zheng, Y. (eds.) Advances in Cryptology-AUSCRYPT’92. Lecture Notes in Computer Science, vol. 718, pp. 67–79. Springer (1993)
Capocelli, R.M., Santis, A.D., Gargano, L., Vaccaro, U.: On the size of shares for secret shairing schemes. J. Cryptol. 6, 157–168 (1993)
Lysyanskaya, A., Peikert, C.: Adaptive security in the threshold setting: from cryptosystem to signature schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 331–350. Springer, Heidelberg (2001)
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Kaya, T., Lin, G., Yilmaz, G.N.: Secure multicast groups on ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Work-shop on Security of Ad Hoc and Sensor Networks, pp. 94–102. ACM Press, New York (2003)
Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad-Hoc Networks, in Conjunction with the 2003 International Symposium on Applications and the Internet, pp. 342–346 (2003)
Mishra, M., Bhatele, M.: Improved cloud security approach with threshold cryptography. Int. J. Master Eng. Res. Technol. 2, 119–126 (2015)
Bharill, S., Hamsapriya, T., Lalwani, P.: A secure key for cloud using threshold cryptography in Kerberos. Int. J. Comput. Appl. 79, 35–41 (2003)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Proceedings of Advances in Cryptology—Crypto’89. Lecture Notes in Computer Science, Santa Barbara, vol. 435, pp. 307–315 (1990)
Basseville, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application. Prentice Hall (1993)
Brodsky, B.E., Darkhovsky, B.S.: Nonparametric Methods in Change-point Problems. Kluwer Academic Publishers (1993)
NIST SP 800-57.: Recommendation for Key Management Part1: General (Revised), NIST Special Publication, Special Publication 800-57 (2007)
Gharib, H., Belloulata, K.: Authentication architecture using threshold cryptography in kerberos for mobile ad hoc networks. Adv. Sci. Technol. Res. J. 8, 12–18 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Janratchakool, W., Boonkrong, S., Smanchat, S. (2016). Finding an Optimal Parameter for Threshold Cryptography. In: Meesad, P., Boonkrong, S., Unger, H. (eds) Recent Advances in Information and Communication Technology 2016. Advances in Intelligent Systems and Computing, vol 463. Springer, Cham. https://doi.org/10.1007/978-3-319-40415-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-40415-8_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40414-1
Online ISBN: 978-3-319-40415-8
eBook Packages: EngineeringEngineering (R0)