Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

ESEC: An Ideal Secret Sharing Scheme

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 308))

Abstract

Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptography (ECC). The proposed scheme is to distribute a secret to a non-intersecting group of participants with different privilege levels. In our implementation, we have three phases involving share generation, distribution, and secret regeneration. The threshold of different privilege levels is different and for reconstruction of the secret all participants will have to be from the same privilege level. The proposed scheme is a perfect and ideal secret sharing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography, published by Springer, Berlin (2004)

    Google Scholar 

  2. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the AFIPS National Computer Conference, pp. 313–317 (1979)

    Google Scholar 

  4. Yamamoto, H.: On secret sharing systems using (k, L, n) threshold scheme. IECE. Trans., vol. J68–A(9), pp. 945–952, 1985 (in Japanese). English translation: Electronics and Communications in Japan, Part I, vol. 69(9), pp. 46–54, Scripta Technica, Inc., 1986

    Google Scholar 

  5. Xu, C., Xiao, G.: A threshold multiple secret sharing scheme. Acta Electronica Sin. 10(32), 1387–1689 (2004)

    Google Scholar 

  6. Sun, H., Zheng, X., Yu, Y.: A proactive secret sharing scheme based on elliptic curve cryptography 1st International Workshop on Education Technology and Computer Science, vol. 2, pp. 666–669 (2009)

    Google Scholar 

  7. Hua, S., Aimin, W.: A multi-secret sharing scheme with general access structures based on elliptic curve (2010)

    Google Scholar 

  8. Chen, H., Ling, S., Xing, C.: Access structures of elliptic secret sharing schemes (2008)

    Google Scholar 

  9. Farras, O., Padr´o, C.: Ideal secret sharing schemes for useful multipartite access structures IEEE, Springer, Berlin (2007)

    Google Scholar 

  10. Farràs, O., Padró, C.: Ideal hierarchical secret sharing schemes. IEEE Trans. Inf. theor. 58(5) (2012)

    Google Scholar 

  11. Beimel, A.: Secret-sharing schemes: A survey, Springer LNCS 6639, pp. 11–46 (2011)

    Google Scholar 

  12. Chen, H., Ling, S., Xing, C.: Access structures of elliptic secret sharing schemes. IEEE Trans. Inf. Theor. 54(2) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Greeshma Sarath .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Sarath, G., Deepu, S., Sundararajan, S., Achuthan, K. (2015). ESEC: An Ideal Secret Sharing Scheme. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2012-1_15

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2011-4

  • Online ISBN: 978-81-322-2012-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics