Skip to main content

Finding an Optimal Parameter for Threshold Cryptography

  • Conference paper
  • First Online:
Recent Advances in Information and Communication Technology 2016

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 463))

  • 501 Accesses

Abstract

Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has been no research attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore, to design and implement a guideline that can assist in choosing such value. The experiment was setup to collecting and observing the time used in distribution and reconstruction process to optimize proper threshold value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  2. Kerckhoffs, A.: La Cryptographie militaire. J. Des. Sci. Mil. 9, 5–83 (1883)

    Google Scholar 

  3. Sharmir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blakley, G.R.: Safeguarding cryptographic keys, In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) Proceedings of the 1979 AFIPS National Computer Conference, AFIPS Conference Proceeding, vol. 48, pp. 313–317. AFIPS Press (1979)

    Google Scholar 

  5. Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology-CRYPTO’88. Lecture Notes in Computer Science, vol. 403, pp. 27–35. Springer (1990)

    Google Scholar 

  6. Bertilsson, M., Ingemarsson, I.: A construction of practical secret sharing schemes using linear block codes. In: Seberry, J., Zheng, Y. (eds.) Advances in Cryptology-AUSCRYPT’92. Lecture Notes in Computer Science, vol. 718, pp. 67–79. Springer (1993)

    Google Scholar 

  7. Capocelli, R.M., Santis, A.D., Gargano, L., Vaccaro, U.: On the size of shares for secret shairing schemes. J. Cryptol. 6, 157–168 (1993)

    Article  MATH  Google Scholar 

  8. Lysyanskaya, A., Peikert, C.: Adaptive security in the threshold setting: from cryptosystem to signature schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 331–350. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)

    Google Scholar 

  10. Kaya, T., Lin, G., Yilmaz, G.N.: Secure multicast groups on ad hoc networks. In: SASN’03: Proceedings of the 1st ACM Work-shop on Security of Ad Hoc and Sensor Networks, pp. 94–102. ACM Press, New York (2003)

    Google Scholar 

  11. Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad-Hoc Networks, in Conjunction with the 2003 International Symposium on Applications and the Internet, pp. 342–346 (2003)

    Google Scholar 

  12. Mishra, M., Bhatele, M.: Improved cloud security approach with threshold cryptography. Int. J. Master Eng. Res. Technol. 2, 119–126 (2015)

    Google Scholar 

  13. Bharill, S., Hamsapriya, T., Lalwani, P.: A secure key for cloud using threshold cryptography in Kerberos. Int. J. Comput. Appl. 79, 35–41 (2003)

    Google Scholar 

  14. Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Proceedings of Advances in Cryptology—Crypto’89. Lecture Notes in Computer Science, Santa Barbara, vol. 435, pp. 307–315 (1990)

    Google Scholar 

  15. Basseville, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application. Prentice Hall (1993)

    Google Scholar 

  16. Brodsky, B.E., Darkhovsky, B.S.: Nonparametric Methods in Change-point Problems. Kluwer Academic Publishers (1993)

    Google Scholar 

  17. NIST SP 800-57.: Recommendation for Key Management Part1: General (Revised), NIST Special Publication, Special Publication 800-57 (2007)

    Google Scholar 

  18. Gharib, H., Belloulata, K.: Authentication architecture using threshold cryptography in kerberos for mobile ad hoc networks. Adv. Sci. Technol. Res. J. 8, 12–18 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weena Janratchakool .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Janratchakool, W., Boonkrong, S., Smanchat, S. (2016). Finding an Optimal Parameter for Threshold Cryptography. In: Meesad, P., Boonkrong, S., Unger, H. (eds) Recent Advances in Information and Communication Technology 2016. Advances in Intelligent Systems and Computing, vol 463. Springer, Cham. https://doi.org/10.1007/978-3-319-40415-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40415-8_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40414-1

  • Online ISBN: 978-3-319-40415-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics