Araştırma Makalesi
BibTex RIS Kaynak Göster

THE BLAKLEY BASED SECRET SHARING APPROACH

Yıl 2019, Cilt: 37 Sayı: 2, 488 - 494, 01.06.2019

Öz

Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is also important. Imagine you encrypt your important files with are secret key and if such a key is lost, then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. In this paper we propose a new approach to construct Blakley's scheme by using the finite fields.

Kaynakça

  • [1] Beimel, A., Chee, Y. M., Gwo, I., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C., (ed), Secret Sharing Schemes: A Study, Springer, 2011, 6639, pp. 11-46.
  • [2] Blakley, G. R., Safeguarding Cryptographic Keys, AFIPS Conf. Proc., vol. 48, pp. 313-317, 1979.
  • [3] Blakley, G. R. and Kabatianski, G. A., Linear Algebra Approach to Secret Sharing Schemes, In Proc. of Error Control, Cryptology and Speech Compression, Lecture Notes in Computer Science, vol 229, pp. 33-40, 1994.
  • [4] Bozkurt, I. N., Kaya, K., Selçuk, A. A., Güloğlu, A. M., Threshold Cryptography Based on Blakley Secret Sharing, In Proc. of Information Security and Cryptology 2008, Ankara, Turkey, Dec. 2008.
  • [5] Chen, C. C. and Fu, W. Y., A Geometry Based Secret Image Sharing Approach, Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567-1577, 2008.
  • [6] Csirmaz, L. and Tardos, G., On-line secret sharing, Cryptology ePrint Archive, Report 2011/174, 2011.
  • [7] Ebri, N. Al and Yeun, C. Y., Study on Secret Sharing Schemes (SSS) and Their Applications, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, pp. 40-45, 2011.
  • [8] Iftere, S., Secret sharing schemes with applications in security protocols, Technical Report TR 07-01, University Alexandruloan Cuza of Iasi, Faculty of Computer Science, January 2007.
  • [9] Martin, K., Challenging the Adversary Model in Secret Sharing Schemes, In Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pp. 45-63, 2008.
  • [10] Shamir, A., How to Share a Secret, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.
  • [11] Tso, H. K., Sharing Secret Images Using Blakley's Concept, Optical Engineering, vol. 47, no. 7, pp. 21-23, 2008.
  • [12] Tso, R., A Study on Secret Sharing Schemes with Dishonest Dealers and Participants, University of Tsukba, January 2004.
Yıl 2019, Cilt: 37 Sayı: 2, 488 - 494, 01.06.2019

Öz

Kaynakça

  • [1] Beimel, A., Chee, Y. M., Gwo, I., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C., (ed), Secret Sharing Schemes: A Study, Springer, 2011, 6639, pp. 11-46.
  • [2] Blakley, G. R., Safeguarding Cryptographic Keys, AFIPS Conf. Proc., vol. 48, pp. 313-317, 1979.
  • [3] Blakley, G. R. and Kabatianski, G. A., Linear Algebra Approach to Secret Sharing Schemes, In Proc. of Error Control, Cryptology and Speech Compression, Lecture Notes in Computer Science, vol 229, pp. 33-40, 1994.
  • [4] Bozkurt, I. N., Kaya, K., Selçuk, A. A., Güloğlu, A. M., Threshold Cryptography Based on Blakley Secret Sharing, In Proc. of Information Security and Cryptology 2008, Ankara, Turkey, Dec. 2008.
  • [5] Chen, C. C. and Fu, W. Y., A Geometry Based Secret Image Sharing Approach, Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567-1577, 2008.
  • [6] Csirmaz, L. and Tardos, G., On-line secret sharing, Cryptology ePrint Archive, Report 2011/174, 2011.
  • [7] Ebri, N. Al and Yeun, C. Y., Study on Secret Sharing Schemes (SSS) and Their Applications, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, pp. 40-45, 2011.
  • [8] Iftere, S., Secret sharing schemes with applications in security protocols, Technical Report TR 07-01, University Alexandruloan Cuza of Iasi, Faculty of Computer Science, January 2007.
  • [9] Martin, K., Challenging the Adversary Model in Secret Sharing Schemes, In Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pp. 45-63, 2008.
  • [10] Shamir, A., How to Share a Secret, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.
  • [11] Tso, H. K., Sharing Secret Images Using Blakley's Concept, Optical Engineering, vol. 47, no. 7, pp. 21-23, 2008.
  • [12] Tso, R., A Study on Secret Sharing Schemes with Dishonest Dealers and Participants, University of Tsukba, January 2004.
Toplam 12 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Research Articles
Yazarlar

Selda Çalkavur Bu kişi benim 0000-0002-1502-123X

Fatih Molla Bu kişi benim 0000-0003-0164-330X

Yayımlanma Tarihi 1 Haziran 2019
Gönderilme Tarihi 18 Şubat 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 37 Sayı: 2

Kaynak Göster

Vancouver Çalkavur S, Molla F. THE BLAKLEY BASED SECRET SHARING APPROACH. SIGMA. 2019;37(2):488-94.

IMPORTANT NOTE: JOURNAL SUBMISSION LINK https://eds.yildiz.edu.tr/sigma/