Research Article
BibTex RIS Cite

THE BLAKLEY BASED SECRET SHARING APPROACH

Year 2019, Volume: 37 Issue: 2, 488 - 494, 01.06.2019

Abstract

Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is also important. Imagine you encrypt your important files with are secret key and if such a key is lost, then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. In this paper we propose a new approach to construct Blakley's scheme by using the finite fields.

References

  • [1] Beimel, A., Chee, Y. M., Gwo, I., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C., (ed), Secret Sharing Schemes: A Study, Springer, 2011, 6639, pp. 11-46.
  • [2] Blakley, G. R., Safeguarding Cryptographic Keys, AFIPS Conf. Proc., vol. 48, pp. 313-317, 1979.
  • [3] Blakley, G. R. and Kabatianski, G. A., Linear Algebra Approach to Secret Sharing Schemes, In Proc. of Error Control, Cryptology and Speech Compression, Lecture Notes in Computer Science, vol 229, pp. 33-40, 1994.
  • [4] Bozkurt, I. N., Kaya, K., Selçuk, A. A., Güloğlu, A. M., Threshold Cryptography Based on Blakley Secret Sharing, In Proc. of Information Security and Cryptology 2008, Ankara, Turkey, Dec. 2008.
  • [5] Chen, C. C. and Fu, W. Y., A Geometry Based Secret Image Sharing Approach, Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567-1577, 2008.
  • [6] Csirmaz, L. and Tardos, G., On-line secret sharing, Cryptology ePrint Archive, Report 2011/174, 2011.
  • [7] Ebri, N. Al and Yeun, C. Y., Study on Secret Sharing Schemes (SSS) and Their Applications, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, pp. 40-45, 2011.
  • [8] Iftere, S., Secret sharing schemes with applications in security protocols, Technical Report TR 07-01, University Alexandruloan Cuza of Iasi, Faculty of Computer Science, January 2007.
  • [9] Martin, K., Challenging the Adversary Model in Secret Sharing Schemes, In Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pp. 45-63, 2008.
  • [10] Shamir, A., How to Share a Secret, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.
  • [11] Tso, H. K., Sharing Secret Images Using Blakley's Concept, Optical Engineering, vol. 47, no. 7, pp. 21-23, 2008.
  • [12] Tso, R., A Study on Secret Sharing Schemes with Dishonest Dealers and Participants, University of Tsukba, January 2004.
There are 12 citations in total.

Details

Primary Language English
Journal Section Research Articles
Authors

Selda Çalkavur This is me 0000-0002-1502-123X

Fatih Molla This is me 0000-0003-0164-330X

Publication Date June 1, 2019
Submission Date February 18, 2019
Published in Issue Year 2019 Volume: 37 Issue: 2

Cite

Vancouver Çalkavur S, Molla F. THE BLAKLEY BASED SECRET SHARING APPROACH. SIGMA. 2019;37(2):488-94.

IMPORTANT NOTE: JOURNAL SUBMISSION LINK https://eds.yildiz.edu.tr/sigma/