SlideShare a Scribd company logo
1 of 4
Download to read offline
italian journal of pure and applied mathematics – n. 32−2014 (325−328) 325
SECRET KEY DISTRIBUTION TECHNIQUE USING THEORY
OF NUMBERS
S. Srinivasan
P. Muralikrishna
School of Advanced Sciences
VIT University
Vellore – 632014
India
e-mails: smrail@gmail.com
pmkrishna@rocketmail.com
N. Chandramowliswaran
Visiting Faculty
Indian Institute of Management Indore
Indore – 453 331
India
e-mail: ncmowli@hotmail.com
Abstract. A group key distribution protocol can enable members of a group to share
a secret group key and use it for secret communications. In this article we review the
number of share holders require to reconstruct the secret grouped among them. The
confidentiality of our proposed protocol is unconditionally secure.
Key words: Key distribution, Secret Sharing.
AMS Classification: 94A60, 94A62.
1. Introduction
Secret sharing is a technique for protecting sensitive data, such as cryptographic
keys. It is used to distribute a secret value to a number of parts or shares that have
to be combined together to access the original value. These shares can then be
given to separate parties that protect them using standard means, e.g., memorize,
store in a computer or in a safe. Secret sharing is used in modern cryptography
to lower the risks associated with compromised data.
A threshold scheme enables a secret to be shared among a group of ℓ members
providing each member with a share. The scheme has a threshold t + 1 if any
326 s. srinivasan, p. muralikrishna, n. chandramowliswaran
subset with cardinality t+1 out of the ℓ shares enables the secret to be recovered.
We will use the notation (t + 1, ℓ) to refer to such a scheme. Ideally, in a (t + 1)
threshold scheme, t shares should not give any information on the secret. We will
discuss later how to express this information. Sharing a secret spreads the risk
of compromising the value across several parties. Standard security assumptions
of secret sharing schemes state that if an adversary gains access to any number
of shares lower than some defined threshold, it gains no information of the se-
cret value. The first secret sharing schemes were proposed by Shamir [1] and
Blakley [5].
Cryptography is the collection of methods and approaches for concealing in-
formation in communications from the access by uninvited or unauthorized par-
ties. A logical art for dealing with this problem is known from early antiquity and
it developed along the centuries, mostly in the frame in which two parties, say no-
bleman and general, or concealed lovers, communicated in written by sending each
other messages which could only be understood when knowing some additional
data, secret keys and the details for the procedure of encrypting and decrypting
the messages algorithm. Algorithms were often assembled from a collection of
useful basic ideas, known by tradition.
The group communication has been developed extensively in many applica-
tions currently. Ensuring the security of a group communication has become one
of the most important issues in the development. Generally speaking, the secu-
rity properties of a group communication include two basic aspects, that is, (i) the
messages transmitted within the group can only be shared by authorized group
members, but not by any unauthorized users and (ii) the transmitted messages
must be able to be authenticated by members. The security properties mentioned
previously imply that a group session key must be used by authorized group
members to encrypt and authenticate the messages.
Suppose we have a large number of people, processes, or systems that want to
communicate with one another in a secure fashion. Let’s further add this group of
people or processes or systems is not static, meaning that the individual entities
may join or leave the group at any time. In such case, if the owner of the secret
can fix the number of share holders, then it will be useful to distribute the shares.
This paper is organized as follows. In Section 2, we provide a technique to
fix the number of share holders to reconstruct the distributed secret among the
share holders and Conclusion is given in Section 3.
2. Main result
In this section, we consider a secret S and attain a protocol to identify the number
of share holders, those who are having the distributed shares among them.
Theorem 2.1. For any positive integer k ≥ 2, there exists k +
k(k − 1)
2
share
holders, sharing the common secret S.
secret key distribution technique using theory of numbers 327
Proof. Select the secret positive integers α, β, αi and βi with 1 ≤ i ≤ k. Define
M = β
( k∑
j=1
β2
j +
∑
i<j
βiβj
)
− 1,
where i, j ∈ {1, 2, ..., k}, a = αM + β, aj = αjM + βj for j ∈ {1, 2, ..., k} and
N =
a
(
k∑
j=1
a2
j +
∑
i<j
aiaj
)
− 1
M
.
Select a secret S such that (S, N) = 1.
Define Yi ≡ Saa2
i (mod N) for i ∈ {1, 2, ..., k}.
Xi,j ≡ Saaiaj (mod N) for i < j and i, j ∈ {1, 2, ..., k}.
Now, it is easy to observe
k∑
i=1
Yi +
∑
i<j
Xi,j ≡ S (mod N).
This completes the proof.
3. Conclusion
Cryptography was born in early ages as a skill of mental combinations put at
the service of privacy and military protection. It developed along time into a
highly mathematized discipline, which unites the science of concealing with the
analysis of attacks into one single unit, cryptorology. There have been numerous
interesting attempts to use the large list of NP complete problems. This paper
hardly deals the expected number of share holder in order to share a secret with
positive integer k ≥ 2.
References
[1] Adi Shamir, How to share a secret, Communications of the ACM, 22 (11)
(1979), 612-613.
[2] Barnard, S., Child, J.M., Higher Algebra, Macmillan and Co., 1952.
[3] Beimel, A., Secret-sharing schemes: a survey, Proceedings of the Third
international conference on Coding and cryptology, Berlin, Heidelberg, 2011,
Springer-Verlag, IWCC’11, 11-46.
[4] Berlekamp, E.R., Algebraic Coding Theory, NY, McGraw-Hill, 1968.
328 s. srinivasan, p. muralikrishna, n. chandramowliswaran
[5] Blakley, G.R., Safeguarding cryptographic keys, Proceedings of the Na-
tional Computer Conference 48 (1979), 313-317.
[6] Herstein, I.N., Topics in Algebra, 2nd Edition, John Wiley, 1975.
[7] Mignotte, M., How to share a secret, Advances in Cryptology - Euro-
crypt82, LNCS, Springer-Verlag, 149 (1983), 371-375.
[8] Muralikrishna, P., Srinivasan, S., Chandramowliswaran, N.,
Secure Schemes for Secret Sharing and Key Distribution using Pell’s equa-
tion, International Journal of Pure and Applied Mathematics, 85 (5) (2013),
933-937.
[9] Srinivasan, S., Muralikrishna, P., Chandramowliswaran, N.,
Authenticated Multiple Key Distribution using Simple Continued Fraction,
International Journal of Pure and Applied Mathematics, 87 (2) (2013),
349-354.
[10] Srinivasan, S., Muralikrishna, P., Chandramowliswaran, N.,
Authenticated Key Distribution using given set of Primes for Secret
Sharing, Submitted.
[11] Niven, I., Zuckerman, H.S., Montgomery, H.L., An Introduction to
the Theory of Numbers, John Wiley.
[12] Apostol, T.M., Introduction to Analytic Number Theory, Springer.
Accepted: 19.12.2013

More Related Content

What's hot

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...dannyijwest
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network securityPriyanka Karancy
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...ijcisjournal
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 

What's hot (18)

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
82 86
82 8682 86
82 86
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
50120140507006
5012014050700650120140507006
50120140507006
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
H42063743
H42063743H42063743
H42063743
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Cyptography and network security
Cyptography and network securityCyptography and network security
Cyptography and network security
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
A New Method for Preserving Privacy in Data Publishing Against Attribute and ...
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 

Viewers also liked

John Pheasant - CV 2015
John Pheasant - CV 2015John Pheasant - CV 2015
John Pheasant - CV 2015John Pheasant
 
Development of Cognitive tools for advanced Mathematics learnng based on soft...
Development of Cognitive tools for advanced Mathematics learnng based on soft...Development of Cognitive tools for advanced Mathematics learnng based on soft...
Development of Cognitive tools for advanced Mathematics learnng based on soft...Chandramowliswaran NARAYANASWAMY
 
Past Tense verb Handout
Past Tense verb HandoutPast Tense verb Handout
Past Tense verb HandoutShah Nawaz
 
6 Habits of Wildly Productive People
6 Habits of Wildly Productive People6 Habits of Wildly Productive People
6 Habits of Wildly Productive PeopleMark DeWitt, SC
 

Viewers also liked (18)

graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)
 
21642583%2E2014%2E985803
21642583%2E2014%2E98580321642583%2E2014%2E985803
21642583%2E2014%2E985803
 
higman
higmanhigman
higman
 
number theory chandramowliswaran theorem
number theory chandramowliswaran theoremnumber theory chandramowliswaran theorem
number theory chandramowliswaran theorem
 
John Pheasant - CV 2015
John Pheasant - CV 2015John Pheasant - CV 2015
John Pheasant - CV 2015
 
April2012ART_01(1)
April2012ART_01(1)April2012ART_01(1)
April2012ART_01(1)
 
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
 
R.S.A Encryption
R.S.A EncryptionR.S.A Encryption
R.S.A Encryption
 
Development of Cognitive tools for advanced Mathematics learnng based on soft...
Development of Cognitive tools for advanced Mathematics learnng based on soft...Development of Cognitive tools for advanced Mathematics learnng based on soft...
Development of Cognitive tools for advanced Mathematics learnng based on soft...
 
Pentru Dani
Pentru DaniPentru Dani
Pentru Dani
 
Godknows K Chiodza cv
Godknows K Chiodza cvGodknows K Chiodza cv
Godknows K Chiodza cv
 
Inchiostri Volpe
Inchiostri Volpe
Inchiostri Volpe
Inchiostri Volpe
 
Management Solutions---Your Human Resources & Human Capital Consultant
Management Solutions---Your Human Resources & Human Capital ConsultantManagement Solutions---Your Human Resources & Human Capital Consultant
Management Solutions---Your Human Resources & Human Capital Consultant
 
Moroccan Cultural Tours
Moroccan Cultural Tours Moroccan Cultural Tours
Moroccan Cultural Tours
 
Las tics web 2
Las tics web 2Las tics web 2
Las tics web 2
 
Submit Article | ArticleBiz.com
Submit Article | ArticleBiz.comSubmit Article | ArticleBiz.com
Submit Article | ArticleBiz.com
 
Past Tense verb Handout
Past Tense verb HandoutPast Tense verb Handout
Past Tense verb Handout
 
6 Habits of Wildly Productive People
6 Habits of Wildly Productive People6 Habits of Wildly Productive People
6 Habits of Wildly Productive People
 

Similar to 29-SrinivasanMuralikrishnaChandramowliswaran

EFFICIENT ANONYMOUS MESSAGE SUBMISSION
EFFICIENT ANONYMOUS MESSAGE SUBMISSION  EFFICIENT ANONYMOUS MESSAGE SUBMISSION
EFFICIENT ANONYMOUS MESSAGE SUBMISSION Nexgen Technology
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERAIRCC Publishing Corporation
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverAIRCC Publishing Corporation
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
 
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...IIRindia
 
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...IJNSA Journal
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfAdiseshaK
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfAdiseshaK
 
journal for research
journal for researchjournal for research
journal for researchrikaseorika
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using RsaIJERA Editor
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
 
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...IAEME Publication
 
An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity  An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity mlaij
 

Similar to 29-SrinivasanMuralikrishnaChandramowliswaran (20)

11
1111
11
 
11
1111
11
 
EFFICIENT ANONYMOUS MESSAGE SUBMISSION
EFFICIENT ANONYMOUS MESSAGE SUBMISSION  EFFICIENT ANONYMOUS MESSAGE SUBMISSION
EFFICIENT ANONYMOUS MESSAGE SUBMISSION
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
 
Az24339344
Az24339344Az24339344
Az24339344
 
529 199-206
529 199-206529 199-206
529 199-206
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
 
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
LOSSLESS RECONSTRUCTION OF SECRET IMAGE USING THRESHOLD SECRET SHARING AND TR...
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdfCNS_Solutions-Adi.pdf
CNS_Solutions-Adi.pdf
 
CNS Solutions-Adi.pdf
CNS Solutions-Adi.pdfCNS Solutions-Adi.pdf
CNS Solutions-Adi.pdf
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
journal for research
journal for researchjournal for research
journal for research
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
 
How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...
A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-1...
 
An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity  An New Attractive Mage Technique Using L-Diversity
An New Attractive Mage Technique Using L-Diversity
 

More from Chandramowliswaran NARAYANASWAMY (20)

M.tech.quiz (1)
M.tech.quiz (1)M.tech.quiz (1)
M.tech.quiz (1)
 
tree-gen-algo
tree-gen-algotree-gen-algo
tree-gen-algo
 
invited-seminar-libre(1)
invited-seminar-libre(1)invited-seminar-libre(1)
invited-seminar-libre(1)
 
testimonial_iit_3_(3)
testimonial_iit_3_(3)testimonial_iit_3_(3)
testimonial_iit_3_(3)
 
Passman
PassmanPassman
Passman
 
recom
recomrecom
recom
 
balakrishnan2004
balakrishnan2004balakrishnan2004
balakrishnan2004
 
DDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDD
 
CCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCC
 
PETERSON BERGE
PETERSON BERGEPETERSON BERGE
PETERSON BERGE
 
FDP SumCourse Schedule July 2009 (1)
FDP SumCourse Schedule July  2009 (1)FDP SumCourse Schedule July  2009 (1)
FDP SumCourse Schedule July 2009 (1)
 
kyoto-seminar
kyoto-seminarkyoto-seminar
kyoto-seminar
 
japan-invite
japan-invitejapan-invite
japan-invite
 
scsvmv-testimonial
scsvmv-testimonialscsvmv-testimonial
scsvmv-testimonial
 
feedback_IIM_Indore
feedback_IIM_Indorefeedback_IIM_Indore
feedback_IIM_Indore
 
testimonial-iit_1 (4)
testimonial-iit_1 (4)testimonial-iit_1 (4)
testimonial-iit_1 (4)
 
ArproTree_journal
ArproTree_journalArproTree_journal
ArproTree_journal
 
15
1515
15
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
Aina_final
Aina_finalAina_final
Aina_final
 

29-SrinivasanMuralikrishnaChandramowliswaran

  • 1. italian journal of pure and applied mathematics – n. 32−2014 (325−328) 325 SECRET KEY DISTRIBUTION TECHNIQUE USING THEORY OF NUMBERS S. Srinivasan P. Muralikrishna School of Advanced Sciences VIT University Vellore – 632014 India e-mails: smrail@gmail.com pmkrishna@rocketmail.com N. Chandramowliswaran Visiting Faculty Indian Institute of Management Indore Indore – 453 331 India e-mail: ncmowli@hotmail.com Abstract. A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In this article we review the number of share holders require to reconstruct the secret grouped among them. The confidentiality of our proposed protocol is unconditionally secure. Key words: Key distribution, Secret Sharing. AMS Classification: 94A60, 94A62. 1. Introduction Secret sharing is a technique for protecting sensitive data, such as cryptographic keys. It is used to distribute a secret value to a number of parts or shares that have to be combined together to access the original value. These shares can then be given to separate parties that protect them using standard means, e.g., memorize, store in a computer or in a safe. Secret sharing is used in modern cryptography to lower the risks associated with compromised data. A threshold scheme enables a secret to be shared among a group of ℓ members providing each member with a share. The scheme has a threshold t + 1 if any
  • 2. 326 s. srinivasan, p. muralikrishna, n. chandramowliswaran subset with cardinality t+1 out of the ℓ shares enables the secret to be recovered. We will use the notation (t + 1, ℓ) to refer to such a scheme. Ideally, in a (t + 1) threshold scheme, t shares should not give any information on the secret. We will discuss later how to express this information. Sharing a secret spreads the risk of compromising the value across several parties. Standard security assumptions of secret sharing schemes state that if an adversary gains access to any number of shares lower than some defined threshold, it gains no information of the se- cret value. The first secret sharing schemes were proposed by Shamir [1] and Blakley [5]. Cryptography is the collection of methods and approaches for concealing in- formation in communications from the access by uninvited or unauthorized par- ties. A logical art for dealing with this problem is known from early antiquity and it developed along the centuries, mostly in the frame in which two parties, say no- bleman and general, or concealed lovers, communicated in written by sending each other messages which could only be understood when knowing some additional data, secret keys and the details for the procedure of encrypting and decrypting the messages algorithm. Algorithms were often assembled from a collection of useful basic ideas, known by tradition. The group communication has been developed extensively in many applica- tions currently. Ensuring the security of a group communication has become one of the most important issues in the development. Generally speaking, the secu- rity properties of a group communication include two basic aspects, that is, (i) the messages transmitted within the group can only be shared by authorized group members, but not by any unauthorized users and (ii) the transmitted messages must be able to be authenticated by members. The security properties mentioned previously imply that a group session key must be used by authorized group members to encrypt and authenticate the messages. Suppose we have a large number of people, processes, or systems that want to communicate with one another in a secure fashion. Let’s further add this group of people or processes or systems is not static, meaning that the individual entities may join or leave the group at any time. In such case, if the owner of the secret can fix the number of share holders, then it will be useful to distribute the shares. This paper is organized as follows. In Section 2, we provide a technique to fix the number of share holders to reconstruct the distributed secret among the share holders and Conclusion is given in Section 3. 2. Main result In this section, we consider a secret S and attain a protocol to identify the number of share holders, those who are having the distributed shares among them. Theorem 2.1. For any positive integer k ≥ 2, there exists k + k(k − 1) 2 share holders, sharing the common secret S.
  • 3. secret key distribution technique using theory of numbers 327 Proof. Select the secret positive integers α, β, αi and βi with 1 ≤ i ≤ k. Define M = β ( k∑ j=1 β2 j + ∑ i<j βiβj ) − 1, where i, j ∈ {1, 2, ..., k}, a = αM + β, aj = αjM + βj for j ∈ {1, 2, ..., k} and N = a ( k∑ j=1 a2 j + ∑ i<j aiaj ) − 1 M . Select a secret S such that (S, N) = 1. Define Yi ≡ Saa2 i (mod N) for i ∈ {1, 2, ..., k}. Xi,j ≡ Saaiaj (mod N) for i < j and i, j ∈ {1, 2, ..., k}. Now, it is easy to observe k∑ i=1 Yi + ∑ i<j Xi,j ≡ S (mod N). This completes the proof. 3. Conclusion Cryptography was born in early ages as a skill of mental combinations put at the service of privacy and military protection. It developed along time into a highly mathematized discipline, which unites the science of concealing with the analysis of attacks into one single unit, cryptorology. There have been numerous interesting attempts to use the large list of NP complete problems. This paper hardly deals the expected number of share holder in order to share a secret with positive integer k ≥ 2. References [1] Adi Shamir, How to share a secret, Communications of the ACM, 22 (11) (1979), 612-613. [2] Barnard, S., Child, J.M., Higher Algebra, Macmillan and Co., 1952. [3] Beimel, A., Secret-sharing schemes: a survey, Proceedings of the Third international conference on Coding and cryptology, Berlin, Heidelberg, 2011, Springer-Verlag, IWCC’11, 11-46. [4] Berlekamp, E.R., Algebraic Coding Theory, NY, McGraw-Hill, 1968.
  • 4. 328 s. srinivasan, p. muralikrishna, n. chandramowliswaran [5] Blakley, G.R., Safeguarding cryptographic keys, Proceedings of the Na- tional Computer Conference 48 (1979), 313-317. [6] Herstein, I.N., Topics in Algebra, 2nd Edition, John Wiley, 1975. [7] Mignotte, M., How to share a secret, Advances in Cryptology - Euro- crypt82, LNCS, Springer-Verlag, 149 (1983), 371-375. [8] Muralikrishna, P., Srinivasan, S., Chandramowliswaran, N., Secure Schemes for Secret Sharing and Key Distribution using Pell’s equa- tion, International Journal of Pure and Applied Mathematics, 85 (5) (2013), 933-937. [9] Srinivasan, S., Muralikrishna, P., Chandramowliswaran, N., Authenticated Multiple Key Distribution using Simple Continued Fraction, International Journal of Pure and Applied Mathematics, 87 (2) (2013), 349-354. [10] Srinivasan, S., Muralikrishna, P., Chandramowliswaran, N., Authenticated Key Distribution using given set of Primes for Secret Sharing, Submitted. [11] Niven, I., Zuckerman, H.S., Montgomery, H.L., An Introduction to the Theory of Numbers, John Wiley. [12] Apostol, T.M., Introduction to Analytic Number Theory, Springer. Accepted: 19.12.2013