The Key Management System using the Secret Sharing Scheme Applicable to Smart Card

스마트 카드에 적용 가능한 비밀분산법을 이용한 키 관리 시스템

  • Published : 2004.10.01


When several service providers want to work together with only one master key, they need to properly distribute the key to participants who come in for the co-work business and then securely manage the distributed keys. This paper describes the system that can efficiently and securely manage the master key on the basis of the secret sharing scheme that can reconstruct original secret information as the necessity of reconstructing original secret arises. The proposed system can distribute secret information to several groups and also redistribute the secret to subgroup in proportion to the participant's security level using smart card-based (t, t)-(k, n)-threshold secret scheme for securely keeping secret information and authentication of participant's identification.


  1. Shamir A, 'How to Share a Secret,' Comm. Of the ACM, 22, pp.612-613, 1979
  2. Digital Cellular Telecommunications Systems Phase 2+, Specification of Subscriber Identification Module-(SIM-ME) interface, GSM 11.11, ETSI
  3. Ahmet M.Eskiciouglu, 'A Key Transport Protocol Based on Secret Sharing-Applications to Information Security,' IEEE Transactions on Consumer Electronics, Vol.48, No.4, pp.816-824, November, 2002
  4. D. Catalano and R. Gennaro. 'New and Efficient Protocols for Verifiable Signature Sharing and Other Applications,' pp.51-80, August, 2000. Preliminary version in the proceedings of CRYPTO'98, Springer-Verlag LNCS 1462, pp.105-120
  5. E. F Brickell and D.R. Stinson, 'Some Improved Bounds on the information Rate of Perfect Secret Sharing Schemes,' Journal of cryptology, Vol.5, pp.153-166, 1992
  6. ISO/IEC 7816-4, identification cards-integrated circuit(s) cards with contacts-interindustry commands for interchange, 1995
  7. Java Card 2.1.1, Sun Microsystems, 1998
  8. E, D. karnin, J. W. Greene and M. E. Hellman, 'On Secret Sharing Systems,' IEEE Transaction on Information Theory, v.IT-29, pp.35-41, 1983
  9. Douglas R. Stinson, 'Cryptography theory and Practice,' CRC press, Inc, pp.330-331, 1995
  10. Sun microsystems, java card API 2.1 Application Programming Interface, 1998
  11. Global platform,
  12. ISO/IEC 7816-4, identification cards-integrated circuit(s) cards with contacts-interindustry commands for interchange, '5.3. APDU message structure,' pp.7-10, 1995
  13. Global Platform, Open Platform Card Specification Ver.2.1, pp.(10-1)-(10-2), June, 2001
  14. M. Stadler, 'Publicly Verifiable Secret Sharing,' Advances in Cryptography-Eurocrypto96, LNCS, Vol.1070, pp.190-199, Springer-Verlag, 1996

Cited by

  1. A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System vol.14, pp.11, 2013,