• 제목/요약/키워드: Key sharing scheme

검색결과 98건 처리시간 0.018초

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2008년도 추계 공동 국제학술대회
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

Improvements of a Group key Management based on (2,2) Secret Sharing

  • Yong, Seunglim
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권9호
    • /
    • pp.73-78
    • /
    • 2016
  • In 2014, Wuu et al. proposed a group key management scheme based on (2,2) secret sharing. They asserted that their scheme satisfies security requirements and mutual authentication. But this paper pointed out that their scheme does not satisfy mutual authentication and impersonating attack. In this paper, we describe the reasons and processes that a malicious group member can impersonate the Group Key Distributor. To fill the gaps, we discuss the problems, and propose an improved protocol.

보안성과 유연성을 갖춘 데이터 공유 방안 (A Data Sharing Scheme with Security and Flexibility)

  • 이구연;김화종;정충교
    • 산업기술연구
    • /
    • 제24권B호
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현 (Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility)

  • 이구연;이용;김화종;정충교;이동은
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds

  • Lu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2703-2718
    • /
    • 2015
  • Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is a public-key primitive that can delegate the decryption right from one user to another. In a proxy re-encryption system, a semi-trusted proxy authorized by a data owner is allowed to transform an encrypted data under the data owner's public key into a re-encrypted data under an authorized recipient's public key without seeing the underlying plaintext. Hence, the paradigm of proxy re-encryption provides a promising solution to effectively share encrypted data. In this paper, we propose a new certificate-based proxy re-encryption scheme for encrypted data sharing in public clouds. In the random oracle model, we formally prove that the proposed scheme achieves chosen-ciphertext security. The simulation results show that it is more efficient than the previous certificate-based proxy re-encryption schemes.

임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구 (Study on Threshold Scheme based Secure Secret Sharing P2P System)

  • 최정현
    • 인터넷정보학회논문지
    • /
    • 제23권3호
    • /
    • pp.21-33
    • /
    • 2022
  • 본 논문은 기업비밀 노출로 초래될 손실을 현격히 줄일 안전 비밀조각 공유 시스템을 제안한다. 본 연구 시스템은 중앙서버 방식이 아닌 효율적 P2P 분산 시스템을 제안한다. 최근 비트코인 유통 시스템도 역시 P2P 분산 방식을 사용하고 있다. 본 연구는 기능이 단순하고 확장성이 높고 전송 효율적인 토렌트 P2P 분산 구조와 그 프로토콜을 사용하여 토렌트 파일조각 대신 임계 샤미르(Shamir) 비밀조각의 보안 유통을 설계한다. 본 연구는 임계 샤미르 비밀조각 공유기법 (Threshold Shamir Secret Sharing Scheme)을 시스템에 적용하고. 동시에 다중 협동장치의 서명기법을 사용하여 안전하고 강력한 다중인증방식의 사용자 인증을 수행한다. 안전한 비밀 데이터 유통도 공개키로 암호화 교환된 임시키의 대칭암호방식의 효율적 암호화로 전송을 한다. 짧은 유효기간의 임시키는 세션 동안 생성되고 세션 마감후 소멸하므로 키 노출에서 안전하다. 특별히 본 제안한 시스템의 특징은 임계 분산기법을 효율적 토렌트 P2P 분산 시스템에 구조적 변경없이 효과적으로 적용한다. 동시에 본 시스템은 효율적인 임시키 대칭암호방식으로 비밀파일 유통에 기밀성을 보장하고 임시키는 공개키 암호방식으로 안전하게 교환된다, 본 시스템은 외부 유출 기기도 사용자로 동적 등록이 가능하다. 이 확장성으로 기밀성과 인증성을 동적으로 등록된 사용자에게도 적용할 수 있다.

Shamir의 비밀 공유 방식의 그룹 키 전송 프로토콜 (Group Key Transfer Protocol Based on Shamir's Secret Sharing)

  • 김영식
    • 한국통신학회논문지
    • /
    • 제39B권9호
    • /
    • pp.555-560
    • /
    • 2014
  • 최근 그룹 내의 여러 멤버 사이에 하나의 그룹 세션키를 공유하는 연구가 활발히 진행되고 있다. 그 중에서 Harn과 Lin에 의해 Shamir의 비밀 공유 방식을 이용한 방식이 제안되었고, 이를 개선한 프로토콜이 Liu, Cheng, Cao, 그리고 Jiang에 의해서 다시 제안되었다. 특히 기존 방식들에서는 특정한 일부 비밀 정보를 알고 있는 그룹 멤버에 의해 다른 비밀 값이 알려지게 되는 '내부자 공격'에 대응하기 위해 유한한 원소를 갖는 유한 정수 환(finite integer ring)상에서 연산이 이루어지도록 프로토콜을 설계하였다. 이 논문에서는 기존 방식들이 기반을 둔 유한 정수 환상의 그룹 세션키 분배 연산에서는 정당한 그룹 멤버들도 특정한 조건에서는 키 복구가 불가능한 상황이 발생하여 그룹 키 전송이 실패할 수 있음을 먼저 밝힐 것이다. 또한 이런 문제를 해결할 수 있는 새로운 프로토콜을 설계하여 제안한다.