SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
DOI:10.5121/ijcsit.2017.9603 35
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET
SHARING SCHEME USING SMT SOLVER
K. Vishnu Priyanka1
, M. Gowthami1
, O. Susmitha1
, G. Prathyusha1
, Naresh Babu
Muppalaneni2,*
1
Student, Department of CSSE, Sree Vidyanikethan Engineering College (Autonomous),
India
2
Associate Professor, Department of CSSE, Sree Vidyanikethan Engineering College
(Autonomous), India.
ABSTRACT
The secret sharing schemes are the important tools in cryptography that are used as building blocks in
many secured protocols. It is a method used for distributing a secret among the participants in a manner
that only the threshold number of participants together can recover the secret and the remaining set of
participants cannot get any information about the secret. Secret sharing schemes are absolute for storing
highly sensitive and important information. In a secret sharing scheme, a secret is divided into several
shares. These shares are then distributed to the participants’ one each and thus only the threshold (t)
number of participants can recover the secret. In this paper we have used Mignotte’s Sequence based
Secret Sharing for distribution of shares to the participants. A (k, m) Mignotte's sequence is a sequence of
pair wise co-prime positive integers. We have proposed a new method for reconstruction of secret even
with t-1 shares using the SMT solver.
KEYWORDS
Secret sharing, Data Security, Mignotte’s sequence, SMT solver, Satisfiability
1.INTRODUCTION
Secret Sharing Scheme (SSS) is a method in which a key can be divided into n pieces of
information called shares such that i) key can be reconstructed from certain authorized groups of
shares and ii) key cannot be reconstructed from unauthorized groups of shares[1-3]. There were
security threats to data before the discovery of secret sharing schemes, as we needed to keep the
various duplicates of information at better places. With the goal that we could recover the
information from another source if the information is lost or harmed physically or decimated by
an infection or the information is changed at one of the spots. In any case, we realize that the
security threats are increased by increasing the copies of data. Now, secret sharing schemes came
into existence to address these issues. A secret sharing scheme is a method used by the dealer to
distribute the shares to parties in a way that only the authorized set of parties can reconstruct the
secret. The secret sharing schemes are the important tools in cryptography that are used as
building blocks in many secured protocols, e.g., threshold cryptography, access control, attribute-
based encryption. In a secret sharing scheme a dealer will have a secret, there will be n parties,
among them any ‘t’ participants are considered as authorized set who can reconstruct the secret.
‘t’ is known as threshold value. The secret cannot be reconstructed even with ‘t-1’ shares[4].
Blakley[5] proposed a SSS which utilizes hyper plane geometry to solve the secret sharing
problem. To execute this (t, n) threshold scheme, each one among the n participants is given a
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9,
hyper-plane equation in a t dimensional spa
through a specific point. The intersection point
If the set of possible shares are similar
share, then the secret sharing scheme is said to be ideal.
= loglYl / loglXl = 1
where X is possible secrets set, Y
1.1 SMT Solver
SMT solver is Satisfiability modulo theory
respect to combinations of background theories expressed in classical first order logic with
equality. It can be considered as a form of the constraint satisfaction problem. Generally
solver are useful both for verification, proving for correctness of the program and software
testing. Some of the SMT solvers are SIMPLIFY
using Z3 solver for reconstructing the secret.
Z3 is another SMT solver from Microsoft Research. It is
software verification and software analysis. Consequently, it integrates support for a variety of
theories. Z3 uses novel calculations
[7]. Z3 is a state-of-the art theorem prover from Microsoft Research. It can be
the satisfiability of logical formulas over one or more theories. Z3 offers a
software analysis and verification tools, since
supported theories.
1.2 Mignotte’s sequence based secret sharing scheme
Assume t and n which represents the threshold value and the number of participants respectively,
be two values such that m > 2 and 2
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
plane equation in a t dimensional space over a finite field. Then, each hyper plane passes
point. The intersection point purpose of the hyper planes is the secret
similar to that of the secrets and each participant is given just one
share, then the secret sharing scheme is said to be ideal.
Y is possible shares set and is the information rate.
modulo theory where a decision problem for logical formulas with
respect to combinations of background theories expressed in classical first order logic with
as a form of the constraint satisfaction problem. Generally
solver are useful both for verification, proving for correctness of the program and software
testing. Some of the SMT solvers are SIMPLIFY, CVC3, PARADOX, Z3. Here, now
r for reconstructing the secret.
SMT solver from Microsoft Research. It is focused at solving problems that arise in
software verification and software analysis. Consequently, it integrates support for a variety of
lculations for quantifier instantiation [6] and hypothesis
the art theorem prover from Microsoft Research. It can be utilized
the satisfiability of logical formulas over one or more theories. Z3 offers a convincin
software analysis and verification tools, since a few regular software constructs map directly into
Figure 1: Z3 system architecture
Mignotte’s sequence based secret sharing scheme
Assume t and n which represents the threshold value and the number of participants respectively,
> 2 and 2 ≤ k ≤ m. A (k, m) Mignotte's sequence is a sequence of pair
No 6, December 2017
36
each hyper plane passes
of the hyper planes is the secret.
that of the secrets and each participant is given just one
a decision problem for logical formulas with
respect to combinations of background theories expressed in classical first order logic with
as a form of the constraint satisfaction problem. Generally, SMT
solver are useful both for verification, proving for correctness of the program and software
, CVC3, PARADOX, Z3. Here, now we are
at solving problems that arise in
software verification and software analysis. Consequently, it integrates support for a variety of
hypothesis combination
utilized to check
convincing match for
software constructs map directly into
Assume t and n which represents the threshold value and the number of participants respectively,
) Mignotte's sequence is a sequence of pair
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
37
wise co-prime positive integers M1 < M2 < ... <Mm such that ∏ i, the product of the smallest
k of them is greater than the product of the
(k-1) biggest one.
For example a (3, 5) Mignotte's sequence is 7,8,9,10,11.
2. METHODOLOGY
Secret sharing scheme is a method in which a secret is distributed among ‘n’ members such that
a threshold ‘t’ number of participants can retrieve the secret. We are a proposing a new method in
which a secret is revealed for even ‘t-1’ participants using Z3 SMT solver. We are using Z3py
API for reconstructing the secret.
Figure 2: Workflow diagram
2.1 Generation
Select some random co-prime ‘n’ participants. (Eg. 7, 8, 9, 10, 11) Here n=5.Select a threshold
value ’t’ to reconstruct the secret such that t<n.(Eg.3<5).Calculate α and β values where
Enter Mignotte’s sequence
Calculate α and β values
Select the secret between
α &β such that β<S<α
Generation of secret
Distribution of secret among
participants
(I2,P2) (In,Pn)
Using Z3 solver for t-1 shares
...
Retrieving the secret S
(I1,P1
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
38
α=P1*P2*... *Pt and β=Pn*...Pn-t+3*Pn-t+2. Select a Secret ‘S’ between alpha and beta such that β < S
< α. Code is given in Annexure-1.
2.2 Distribution
Shares are calculated and assigned among the participants Si = K mod Pi, 1≤ i ≤ n.
Where Si is share for ith
participant, K is the secret need to distribute, Pi belongs to mignotte’s
sequence.
For example let Number of participants (n) be 5. (7, 9, 11, 13, 15). Let t=3 now calculate
α=7*9*11=693 and β=13*15=195
Secret should be in between beta and alpha.
Let S be 450 hence it satisfies the condition β<K<α.
Now calculate the shares Si=K mod Pi.(1≤i≤n)
S1=450 mod 7=2
S2=450 mod 9=0
S3=450 mod 11=10
S4=450 mod 13=8
S5=450 mod 15=0
Assign the shares Si to ith
participant.
Now the shares are (2,7),(0,9)(10,11)(8,13)(0,15)
2.3 Reconstruction
According to Shamir’s secret sharing scheme for reconstruction of the Secret we need of ‘t’
shares where ‘t’ is the threshold. But here we are presenting a new approach for reconstruction of
secret with ‘t-1’ shares using SMT solver. The SMT solver takes input in smt2lib format. We
have generated the constraints as logical formulas using the python code to give as input to SMT
solver. The SMT solver checks for the satisfiability of logical formulas over one or more theories.
3. RESULTS
C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python secret_sharing_scheme.py
Enter Number of Participants:5
Enter Threshold:3
Enter p1:7
Enter p2:9
Enter p3:11
Enter p4:13
Enter p5:17
Enter Secret (between 221 and 693):330
Select‘t’ shares to reconstruct the secret where t=3.
Enter the Participants id for reconstruction:
Enter Partcipant id(0-4):1
Enter Partcipant id(0-4):2
Enter Partcipant id(0-4):4
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
39
C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python sss.py
[S = 330, I2 = 7, I1 = 0, I0 = 6]
[S = 2013, I1 = 0, I0 = 6, I2 = 7]
[S = 3696, I1 = 0, I0 = 6, I2 = 7]
[S = 5379, I1 = 0, I0 = 6, I2 = 7]
[S = 7062, I1 = 0, I0 = 6, I2 = 7]
Select (t-1) shares for reconstruction
C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python sss.py
[S = 33, I1 = 0, I0 = 6]
[S = 132, I1 = 0, I0 = 6]
[S = 231, I1 = 0, I0 = 6]
[S = 330, I1 = 0, I0 = 6]
[S = 429, I1 = 0, I0 = 6]
The SMT solver is verifying for the satisfiability. If solution exists by satisfying the constraints,
the solution will be displayed. The SMT solver is trying to give all the possible solutions for the
given constraints. Finally we got the secret S= 330 with 2 shares.
4. CONCLUSION
Now-a-days keeping any information secret and safe has become a very important thing for
everyone. Secret sharing schemes are the methods that are necessary for this purpose to keep the
secret confidential. In a secret sharing scheme, a secret is divided into several shares. These
shares are then distributed to the participants’ one each and thus only the threshold (t) number of
participants can recover the secret. In this paper we made an attempt for reconstruction of secret
with ‘t-1’ shares using SMT solver. The constraints in the form of logical formulas are given as
the input to SMT solver to check for the satifiability. Hence new secret sharing schemes have to
evolve to protect against these kind of attacks.
REFERENCES
[1] Beimel. Secure Schemes For Secret Sharing And Key Distribution. Phd Thesis, Technion,1996.
Www.Cs.Bgu.Ac.Il/ Beimel/Pub.Html.
[2] Cheng Gu, And Chin-Chen Chang,“ A Construction For Secret Sharing Scheme With General Access
Structure” , Journal Of Information Hiding And Multimedia Signal Processing Ubiquitous
International Volume 4, Number 1, January 2013 2013 Issn 2073-4212
[3] Sonalipatil, Kapil Tajane, Janhavi Sirdeshpande, “An Explication Of Secret Sharing Schemes With
General Access Structure” International Journal Of Advances In Engineering & Technology, Volume
6, Issue 2, Pp. 883-887, May 2013. Issn: 2231-1963
[4] G. Blakley, “Safeguarding Cryptographic Keys,” In Proceedings Of The National Computer
Conference (Afips 1979), Pp. 313–317, 1979.
[5] A. Shamir. How To Share A Secret. Communications Of The Acm, 22:612-613, 1979.
[6] L. De Moura And N. Bjørner. Efficient E-Matching For Smt Solvers. In Cade’07. Springer-Verlag,
2007.
[7] L. De Moura And N. Bjørner. Model-Based Theory Combination. In Smt’07, 2007.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
40
Annexure-1
# Reading of Mignotte Sequence
def mig_sequence():
for i in range(n):
if(i==0):
P[i]=input("Enter p{}:".format(i+1))
if(i>0):
# pi,pi-1 are not co primes read pi again
while(1):
P[i]=input("Enter p{}:".format(i+1))
if(int(P[i])<=int(P[i-1])):
continue;
if(coprime(int(P[i]),int(P[i-1]))):
break;
#reading mig sequence and calculate alpha and beta and verify beta is lessthan alpha
while(1):
mig_sequence()
alpha=1
for i in range(t):
alpha=alpha*P[i]
print alpha
beta=1
for i in range(t-1):
beta=beta*P[n-i-1]
print beta
if(beta<alpha):
break;
else:
print("The given input is not mignotte seqeuncenPlease re enter the sequencen")
#reading the secret such that beta<Secret<alpha
while(1):
S=input("Enter Secret (between {} and {}):".format(beta,alpha))
if(S<beta or S>alpha):
print("Invalid Secret")
else:
break;
# Shares Distribution
target = open("secret.txt", 'w')
target.truncate()
for i in range(n):
target.write("{} , {} n".format(S%P[i],P[i]))
target.close();
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
41
#Secret Reconstruction
#reading line by line and storing in array
with open("secret.txt", "r") as ins:
array = []
for line in ins:
array.append(line)
#creating Z3py file
target = open("sss.py", 'w')
target.write("from z3 import *n")
I = ["I{}".format(i) for i in range(t)]
for i in range(t):
target.write("{}=Int('{}')n".format(I[i],I[i]))
target.write("S=Int('S')n")
target.write("s=Solver()n")
target.write("s.add(S>0)n")
#input from user for selecting shares
print("Enter the Participants id for reconstruction:n")
i=0
while i<t:
p=input("Enter Partcipant id(0-{}):".format(n-1))
if(p<0 or p>=n):
i=i-1
continue
x=array[p].split( )
target.write("s.add({}==S%{})n".format(I[i],x[2]))
target.write("s.add({}=={})n".format(I[i],x[0]))
i=i+1
target.write("while s.check() == sat:n")
target.write(" print(s.model())ntm = s.model()ntblock = []ntfor d in m:nttc =
d()nttblock.append(c != m[d])nts.add(Or(block))n")
target.close()
#sss.py
A sss file is created to take Participants id for reconstruction by using the SMT solver.
from z3 import *
I0=Int('I0')
I1=Int('I1')
S=Int('S')
s=Solver()
s.add(S>0)
s.add(I0==S%9)
s.add(I0==6)
s.add(I1==S%11)
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017
42
s.add(I1==0)
while s.check() == sat:
print(s.model())
m = s.model()
block = []
for d in m:
c = d()
block.append(c != m[d])
s.add(Or(block))

More Related Content

What's hot

A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...IJERA Editor
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLA RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLcscpconf
 
A ramp code for fine grained access control
A ramp code for fine grained access controlA ramp code for fine grained access control
A ramp code for fine grained access controlcsandit
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at restijccsa
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Dsouza
DsouzaDsouza
Dsouzafdione
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 

What's hot (15)

A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLA RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
 
A ramp code for fine grained access control
A ramp code for fine grained access controlA ramp code for fine grained access control
A ramp code for fine grained access control
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Dsouza
DsouzaDsouza
Dsouza
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 

Similar to Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeUvaraj Shan
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On CryptographyHaley Johnson
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumnexgentech15
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumNexgen Technology
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...SUBHAJIT GHOSH
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptx
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptxUTP_Secret_Sharing_Malaysia_Sonali_Patil.pptx
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptxSonaliPatil763326
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAijcisjournal
 

Similar to Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver (20)

529 199-206
529 199-206529 199-206
529 199-206
 
11
1111
11
 
11
1111
11
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
To allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP treeTo allot secrecy-safe association rules mining schema using FP tree
To allot secrecy-safe association rules mining schema using FP tree
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 
21642583%2E2014%2E985803
21642583%2E2014%2E98580321642583%2E2014%2E985803
21642583%2E2014%2E985803
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...anonymous and efficient authentication scheme for privacy-preserving distribu...
anonymous and efficient authentication scheme for privacy-preserving distribu...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptx
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptxUTP_Secret_Sharing_Malaysia_Sonali_Patil.pptx
UTP_Secret_Sharing_Malaysia_Sonali_Patil.pptx
 
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATAAN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA
 

More from AIRCC Publishing Corporation

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...AIRCC Publishing Corporation
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Big Data and Machine Learning in Defence
Big Data and Machine Learning in DefenceBig Data and Machine Learning in Defence
Big Data and Machine Learning in Defence
 
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 

Recently uploaded

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Recently uploaded (20)

Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 DOI:10.5121/ijcsit.2017.9603 35 BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER K. Vishnu Priyanka1 , M. Gowthami1 , O. Susmitha1 , G. Prathyusha1 , Naresh Babu Muppalaneni2,* 1 Student, Department of CSSE, Sree Vidyanikethan Engineering College (Autonomous), India 2 Associate Professor, Department of CSSE, Sree Vidyanikethan Engineering College (Autonomous), India. ABSTRACT The secret sharing schemes are the important tools in cryptography that are used as building blocks in many secured protocols. It is a method used for distributing a secret among the participants in a manner that only the threshold number of participants together can recover the secret and the remaining set of participants cannot get any information about the secret. Secret sharing schemes are absolute for storing highly sensitive and important information. In a secret sharing scheme, a secret is divided into several shares. These shares are then distributed to the participants’ one each and thus only the threshold (t) number of participants can recover the secret. In this paper we have used Mignotte’s Sequence based Secret Sharing for distribution of shares to the participants. A (k, m) Mignotte's sequence is a sequence of pair wise co-prime positive integers. We have proposed a new method for reconstruction of secret even with t-1 shares using the SMT solver. KEYWORDS Secret sharing, Data Security, Mignotte’s sequence, SMT solver, Satisfiability 1.INTRODUCTION Secret Sharing Scheme (SSS) is a method in which a key can be divided into n pieces of information called shares such that i) key can be reconstructed from certain authorized groups of shares and ii) key cannot be reconstructed from unauthorized groups of shares[1-3]. There were security threats to data before the discovery of secret sharing schemes, as we needed to keep the various duplicates of information at better places. With the goal that we could recover the information from another source if the information is lost or harmed physically or decimated by an infection or the information is changed at one of the spots. In any case, we realize that the security threats are increased by increasing the copies of data. Now, secret sharing schemes came into existence to address these issues. A secret sharing scheme is a method used by the dealer to distribute the shares to parties in a way that only the authorized set of parties can reconstruct the secret. The secret sharing schemes are the important tools in cryptography that are used as building blocks in many secured protocols, e.g., threshold cryptography, access control, attribute- based encryption. In a secret sharing scheme a dealer will have a secret, there will be n parties, among them any ‘t’ participants are considered as authorized set who can reconstruct the secret. ‘t’ is known as threshold value. The secret cannot be reconstructed even with ‘t-1’ shares[4]. Blakley[5] proposed a SSS which utilizes hyper plane geometry to solve the secret sharing problem. To execute this (t, n) threshold scheme, each one among the n participants is given a
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, hyper-plane equation in a t dimensional spa through a specific point. The intersection point If the set of possible shares are similar share, then the secret sharing scheme is said to be ideal. = loglYl / loglXl = 1 where X is possible secrets set, Y 1.1 SMT Solver SMT solver is Satisfiability modulo theory respect to combinations of background theories expressed in classical first order logic with equality. It can be considered as a form of the constraint satisfaction problem. Generally solver are useful both for verification, proving for correctness of the program and software testing. Some of the SMT solvers are SIMPLIFY using Z3 solver for reconstructing the secret. Z3 is another SMT solver from Microsoft Research. It is software verification and software analysis. Consequently, it integrates support for a variety of theories. Z3 uses novel calculations [7]. Z3 is a state-of-the art theorem prover from Microsoft Research. It can be the satisfiability of logical formulas over one or more theories. Z3 offers a software analysis and verification tools, since supported theories. 1.2 Mignotte’s sequence based secret sharing scheme Assume t and n which represents the threshold value and the number of participants respectively, be two values such that m > 2 and 2 International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 plane equation in a t dimensional space over a finite field. Then, each hyper plane passes point. The intersection point purpose of the hyper planes is the secret similar to that of the secrets and each participant is given just one share, then the secret sharing scheme is said to be ideal. Y is possible shares set and is the information rate. modulo theory where a decision problem for logical formulas with respect to combinations of background theories expressed in classical first order logic with as a form of the constraint satisfaction problem. Generally solver are useful both for verification, proving for correctness of the program and software testing. Some of the SMT solvers are SIMPLIFY, CVC3, PARADOX, Z3. Here, now r for reconstructing the secret. SMT solver from Microsoft Research. It is focused at solving problems that arise in software verification and software analysis. Consequently, it integrates support for a variety of lculations for quantifier instantiation [6] and hypothesis the art theorem prover from Microsoft Research. It can be utilized the satisfiability of logical formulas over one or more theories. Z3 offers a convincin software analysis and verification tools, since a few regular software constructs map directly into Figure 1: Z3 system architecture Mignotte’s sequence based secret sharing scheme Assume t and n which represents the threshold value and the number of participants respectively, > 2 and 2 ≤ k ≤ m. A (k, m) Mignotte's sequence is a sequence of pair No 6, December 2017 36 each hyper plane passes of the hyper planes is the secret. that of the secrets and each participant is given just one a decision problem for logical formulas with respect to combinations of background theories expressed in classical first order logic with as a form of the constraint satisfaction problem. Generally, SMT solver are useful both for verification, proving for correctness of the program and software , CVC3, PARADOX, Z3. Here, now we are at solving problems that arise in software verification and software analysis. Consequently, it integrates support for a variety of hypothesis combination utilized to check convincing match for software constructs map directly into Assume t and n which represents the threshold value and the number of participants respectively, ) Mignotte's sequence is a sequence of pair
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 37 wise co-prime positive integers M1 < M2 < ... <Mm such that ∏ i, the product of the smallest k of them is greater than the product of the (k-1) biggest one. For example a (3, 5) Mignotte's sequence is 7,8,9,10,11. 2. METHODOLOGY Secret sharing scheme is a method in which a secret is distributed among ‘n’ members such that a threshold ‘t’ number of participants can retrieve the secret. We are a proposing a new method in which a secret is revealed for even ‘t-1’ participants using Z3 SMT solver. We are using Z3py API for reconstructing the secret. Figure 2: Workflow diagram 2.1 Generation Select some random co-prime ‘n’ participants. (Eg. 7, 8, 9, 10, 11) Here n=5.Select a threshold value ’t’ to reconstruct the secret such that t<n.(Eg.3<5).Calculate α and β values where Enter Mignotte’s sequence Calculate α and β values Select the secret between α &β such that β<S<α Generation of secret Distribution of secret among participants (I2,P2) (In,Pn) Using Z3 solver for t-1 shares ... Retrieving the secret S (I1,P1
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 38 α=P1*P2*... *Pt and β=Pn*...Pn-t+3*Pn-t+2. Select a Secret ‘S’ between alpha and beta such that β < S < α. Code is given in Annexure-1. 2.2 Distribution Shares are calculated and assigned among the participants Si = K mod Pi, 1≤ i ≤ n. Where Si is share for ith participant, K is the secret need to distribute, Pi belongs to mignotte’s sequence. For example let Number of participants (n) be 5. (7, 9, 11, 13, 15). Let t=3 now calculate α=7*9*11=693 and β=13*15=195 Secret should be in between beta and alpha. Let S be 450 hence it satisfies the condition β<K<α. Now calculate the shares Si=K mod Pi.(1≤i≤n) S1=450 mod 7=2 S2=450 mod 9=0 S3=450 mod 11=10 S4=450 mod 13=8 S5=450 mod 15=0 Assign the shares Si to ith participant. Now the shares are (2,7),(0,9)(10,11)(8,13)(0,15) 2.3 Reconstruction According to Shamir’s secret sharing scheme for reconstruction of the Secret we need of ‘t’ shares where ‘t’ is the threshold. But here we are presenting a new approach for reconstruction of secret with ‘t-1’ shares using SMT solver. The SMT solver takes input in smt2lib format. We have generated the constraints as logical formulas using the python code to give as input to SMT solver. The SMT solver checks for the satisfiability of logical formulas over one or more theories. 3. RESULTS C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python secret_sharing_scheme.py Enter Number of Participants:5 Enter Threshold:3 Enter p1:7 Enter p2:9 Enter p3:11 Enter p4:13 Enter p5:17 Enter Secret (between 221 and 693):330 Select‘t’ shares to reconstruct the secret where t=3. Enter the Participants id for reconstruction: Enter Partcipant id(0-4):1 Enter Partcipant id(0-4):2 Enter Partcipant id(0-4):4
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 39 C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python sss.py [S = 330, I2 = 7, I1 = 0, I0 = 6] [S = 2013, I1 = 0, I0 = 6, I2 = 7] [S = 3696, I1 = 0, I0 = 6, I2 = 7] [S = 5379, I1 = 0, I0 = 6, I2 = 7] [S = 7062, I1 = 0, I0 = 6, I2 = 7] Select (t-1) shares for reconstruction C:z3-4.3.2-x86-winz3-4.3.2-x86-winbin>python sss.py [S = 33, I1 = 0, I0 = 6] [S = 132, I1 = 0, I0 = 6] [S = 231, I1 = 0, I0 = 6] [S = 330, I1 = 0, I0 = 6] [S = 429, I1 = 0, I0 = 6] The SMT solver is verifying for the satisfiability. If solution exists by satisfying the constraints, the solution will be displayed. The SMT solver is trying to give all the possible solutions for the given constraints. Finally we got the secret S= 330 with 2 shares. 4. CONCLUSION Now-a-days keeping any information secret and safe has become a very important thing for everyone. Secret sharing schemes are the methods that are necessary for this purpose to keep the secret confidential. In a secret sharing scheme, a secret is divided into several shares. These shares are then distributed to the participants’ one each and thus only the threshold (t) number of participants can recover the secret. In this paper we made an attempt for reconstruction of secret with ‘t-1’ shares using SMT solver. The constraints in the form of logical formulas are given as the input to SMT solver to check for the satifiability. Hence new secret sharing schemes have to evolve to protect against these kind of attacks. REFERENCES [1] Beimel. Secure Schemes For Secret Sharing And Key Distribution. Phd Thesis, Technion,1996. Www.Cs.Bgu.Ac.Il/ Beimel/Pub.Html. [2] Cheng Gu, And Chin-Chen Chang,“ A Construction For Secret Sharing Scheme With General Access Structure” , Journal Of Information Hiding And Multimedia Signal Processing Ubiquitous International Volume 4, Number 1, January 2013 2013 Issn 2073-4212 [3] Sonalipatil, Kapil Tajane, Janhavi Sirdeshpande, “An Explication Of Secret Sharing Schemes With General Access Structure” International Journal Of Advances In Engineering & Technology, Volume 6, Issue 2, Pp. 883-887, May 2013. Issn: 2231-1963 [4] G. Blakley, “Safeguarding Cryptographic Keys,” In Proceedings Of The National Computer Conference (Afips 1979), Pp. 313–317, 1979. [5] A. Shamir. How To Share A Secret. Communications Of The Acm, 22:612-613, 1979. [6] L. De Moura And N. Bjørner. Efficient E-Matching For Smt Solvers. In Cade’07. Springer-Verlag, 2007. [7] L. De Moura And N. Bjørner. Model-Based Theory Combination. In Smt’07, 2007.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 40 Annexure-1 # Reading of Mignotte Sequence def mig_sequence(): for i in range(n): if(i==0): P[i]=input("Enter p{}:".format(i+1)) if(i>0): # pi,pi-1 are not co primes read pi again while(1): P[i]=input("Enter p{}:".format(i+1)) if(int(P[i])<=int(P[i-1])): continue; if(coprime(int(P[i]),int(P[i-1]))): break; #reading mig sequence and calculate alpha and beta and verify beta is lessthan alpha while(1): mig_sequence() alpha=1 for i in range(t): alpha=alpha*P[i] print alpha beta=1 for i in range(t-1): beta=beta*P[n-i-1] print beta if(beta<alpha): break; else: print("The given input is not mignotte seqeuncenPlease re enter the sequencen") #reading the secret such that beta<Secret<alpha while(1): S=input("Enter Secret (between {} and {}):".format(beta,alpha)) if(S<beta or S>alpha): print("Invalid Secret") else: break; # Shares Distribution target = open("secret.txt", 'w') target.truncate() for i in range(n): target.write("{} , {} n".format(S%P[i],P[i])) target.close();
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 41 #Secret Reconstruction #reading line by line and storing in array with open("secret.txt", "r") as ins: array = [] for line in ins: array.append(line) #creating Z3py file target = open("sss.py", 'w') target.write("from z3 import *n") I = ["I{}".format(i) for i in range(t)] for i in range(t): target.write("{}=Int('{}')n".format(I[i],I[i])) target.write("S=Int('S')n") target.write("s=Solver()n") target.write("s.add(S>0)n") #input from user for selecting shares print("Enter the Participants id for reconstruction:n") i=0 while i<t: p=input("Enter Partcipant id(0-{}):".format(n-1)) if(p<0 or p>=n): i=i-1 continue x=array[p].split( ) target.write("s.add({}==S%{})n".format(I[i],x[2])) target.write("s.add({}=={})n".format(I[i],x[0])) i=i+1 target.write("while s.check() == sat:n") target.write(" print(s.model())ntm = s.model()ntblock = []ntfor d in m:nttc = d()nttblock.append(c != m[d])nts.add(Or(block))n") target.close() #sss.py A sss file is created to take Participants id for reconstruction by using the SMT solver. from z3 import * I0=Int('I0') I1=Int('I1') S=Int('S') s=Solver() s.add(S>0) s.add(I0==S%9) s.add(I0==6) s.add(I1==S%11)
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 6, December 2017 42 s.add(I1==0) while s.check() == sat: print(s.model()) m = s.model() block = [] for d in m: c = d() block.append(c != m[d]) s.add(Or(block))