SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
1
A NEW WEIGHTED SECRET SPLITTING METHOD
1
Dr. Abdulameer Khalaf Hussain, 2
Dr. Mohammad Alnabhan, 3
Prof. Faris M.AL-Athari
1
Computer Science, Faculty of Information Technology, Jerash University, Jordan
2
Computer Science, Faculty of Information Technology, Jerash University, Jordan
3
Department of Mathematics, Faculty of Information Technology, Zarqa University, Jordan
ABSTRACT
This paper presents a new method for splitting a secret information method according to the
importance role of each party in a group of users. The splitting procedure takes the secret
information with a suitable length computed in terms of the number of users and their corresponding
weights. Therefore, this method grants an amount of information with respect to each user’s weight.
All previous methods of secret splitting methods did not take into account the user’s priority so the
secret splitting may the same as the length of that secret. This paper also presents a solution for the
problem of the user’s absence and the lost secret part which is considered a major problem in most of
secret splitting methods.
KEYWORDS: Threshold Cryptography, Secret Splitting, Secret Sharing, Weighted Authentication.
I. INTRODUCTION
A secret sharing scheme is any method that can be used to distribute shares of a secret value
among a set of participants. The recovering of the secret value can be done only by qualified subsets
of participants from their shares. Such a scheme is called a perfect scheme if the unqualified subsets
do not obtain any information about the secret value. The qualified subsets form the access structure
of the scheme, which is a monotone increasing family of subsets of participants.
The first secret sharing was introduced independently by Shamir [1] and Blakley [2] in 1979.
They proposed two different methods for constructing secret sharing schemes used for threshold
access structures. In these two schemes, the qualified subsets are those with at least some given
number of participants. Such schemes are ideal. i.e., the length of every share is the same as the
length of the secret, which is the best possible condition [3].
A secret sharing scheme can be used as a fundamental method in secure multiparty
computations which is found in [1,2], where a secret is divided into different shares for distribution
among participants (private data), and a subset of participants then cooperate in order to recover the
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 6, September – October 2013, pp. 01-06
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
2
secret. Shamir proposed the (t, n)-threshold secret sharing scheme .In this scheme, the secret is
divided into n shares to be distribution among certain players. The shares can be constructed such
that any t participants can combine their shares to recover the secret, but any set of t -1 participants
have no knowledge about the secret.
Since the concept of the early secret sharing which was proposed by Shamir in 1979 [1]
(Blakley also did the similar work at that time [2]), there have been many papers extending Shamir’s
scheme and investigating new secret sharing schemes [4], [5], [6], [7], [8], [9],[10], [11], [12], [13],
[14], [15], [16], [17].
Secret sharing schemes can be classified into various categories according to different
criteria. There are two classes (in terms of numbers of secrets to be shared): single secret and
multiple secrets.
When we consider the shares’ capabilities, there are two classes: same-weight shares and
weighted shares. In weighted shares schemes, different shares have different capabilities to recover
the secret(s)–a more weighted share needs fewer other shares and a less weighted share needs more
other shares to recover the secret(s). Also secret sharing can be classified depending on the
underlying techniques used: polynomial based schemes and Chinese Remainder Theorem (CRT)
based schemes. Shamir’s scheme [1] is considered a well –known example polynomial based scheme
and Mignotte’s scheme [12] is a representative among the CRT based secret sharing schemes.
II. RELATED WORKS
In [18] a proposal deals with weighted threshold schemes. This method concentrates mainly
about the properties related to the information rate. The paper presents the complete characterization
of the access structures of weighted threshold schemes when all the minimal authorized subsets have
at most two elements. Finally this paper gave the lower bounds for the optimal rate of these access
structures.
In [19] a construction of a new threshold secret sharing scheme is made by using the concept
of share vector. In this scheme, the number of shareholders can be adjusted by randomly changing
the weights of them. This proposed system was more suitable in the case that the number of
shareholders needs to be changed randomly during the scheme is carrying out.
Z. Yanshuo and L. Zhuojun proposed a secret sharing scheme of shared participants. In this
scheme, based on identity, the secret sharing scheme among weighted participants was analyzed and
a dynamic scheme about secret sharing among weighted participants was presented [20].
Another scheme was proposed to combine the weighted threshold secret sharing schemes
based on the Chinese remainder theorem with the RSA scheme. The aim of this scheme was to
obtain a novelty, weighted threshold decryption or weighted threshold digital signature
generation.[21]
In [22] a secret sharing scheme constructed on adversary structure was proposed based on
Chinese remainder theorem .This scheme is considered a prefect secret sharing scheme and it poses a
reconstruction property and confidentiality property which leads efficiently for prevention of
attacking from external attackers and cheating among participants. Another important property of
this scheme is that allowing participants to be added or deleted dynamically.
A scheme among different weights based on Shamir's secret sharing and Chinese remainder
theorem was proposed. Because of introducing a public –key cryptosystem in elliptic curve in this
scheme, this method did not suffer from any cheating and also a secret channel is not needed to build
between the participants and distributors. [23]
In [24] the authors used the theory of Jordan matrix factorization and combine with the
formulary of Lagrange putting forward an algorithm of (r, n) threshold secret sharing with short
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
3
share and high efficiency. In this scheme, the length of secret share that each participator needs to
conserve has no relation with the length of the secret information. So this scheme has a very high
space, computation and communication efficiency.
III. PRPOPSED SYSTEM
The proposed system of secret splitting in this paper presents a new and a variable
decomposition of secret information. The length of the secret information(S) is chosen depending on
the number of users and their corresponding weights and represented in binary string. This binary
string is divided into amounts depending on the weight (w) of each user in such a way that the
larger amount of the binary string is dedicated to the user of the higher weight. This piece of the
secret binary information must be discarded from the original binary string and apply the same
splitting procedure to the next lower weight.
To perform this task, this paper suggests a set of users and two sets of corresponding weights,
one for the highest weights and the other for the lower weights. These two sets can be used to
provide a partial solution to the problem of the absence of one or more users of lower priorities by
giving certain privileges to the users of the high weights. This task needs a trusted manager to
distribute the shares of other users to those of higher weights. For this reason, the manager must
agree with the latter users with public and private keys to encrypt the distributed shares of lower
weights in the location of users with high weights. The latter users can be able to extract these shares
in the case of absence or the lost of the lower weights shares.
The proposed system assumes a secret splitting system with a new parameter that is (t,n,m) ,
where t is the total number of users , n the number of users that can reconstruct the secret information
and m is the percentage of secret splitting depending on the weight of each user .
THE ALGORITHM
Let S be the binary secret information
Let L be the length of S
Let G={U1,U2,…….Un) be the set of group users
Let WH={wh1,wh2,…..,whm} be the set of high weights
Let WL ={wl1,wl2,…..,wlk} be the set of low weights
Let WT=WhUWL such that:
Wh1>wh2…>whm>whl1>wh2…>whk
Let t be the total of users
Let n be the selected users responsible for recovering the secret S
Let m be the percentage dedicated for each weight
Calculate the length of S :
L= t*n*m
Divide S into variable divisions s1 ,s2 ,…..sn
For i=1 to n
Si=S *wi(m) // The first share is calculated by multiplying S with the percentage of each user //
S= (S-Si) // The new S is calculated by subtracting S from the fist share and we now deal with
the remaining of S to take a percentage of the next user //
Next i
To perform this system it is necessary to construct two tables. The first table (table1) contains the
users of high weights and their corresponding weights and the second table (table 2) is dedicated for
users of low weights and their weights.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
4
Table 1: Users of high weights
User Weight
Uh1 Wh1
Uh2 Wh2
. .
. .
. .
Uhn Whn
Table 2 : Users of low weights
User Weight
Ul1 Wl1
Ul2 Wl2
. .
. .
. .
Uln Wnn
IV. RESULTS
We take an example of some authenticated users with high weights and the corresponding
users of low weights in order to reconstruct the secret information in the case of the absence of users
of low weights .In this example we have 5 users of low weights. Table 3 represents a sample of a
secure repository used for this purpose.
Table 3: Repository Sample
User Weight Corresponding users of low weights
Uh1 Wh1 WL1={Ul1,Ul2,Ul3}
Uh2 Wh2 WL2={ Ul4,Ul5 }
Where WL1 and WL2 represent the sets of users of low weights.
So the user (Uh1) of the first high weight can reconstruct the total secret information by using
information pieces dedicated to Ul1,Ul2 and Ul3 of low weights in cooperation with user (Uh2) who
can extract information pieces of users Ul4 and Ul5 .
V. ANALYSIS
Splitting secrets according to the weights or priories of some users in a variable splitting
shared secrets leads to a more strong authentication mechanism , because the large pieces of secret
information is dedicated to those users who are more trusted than other users who have less amount
of secret information . Also, this proposed system lets the users of higher weights to recover the total
secret information in the case of the absence of the users of lower priorities. In this case we
overcome the major problem found in most splitting methods which is the absence of these users
sharing the secret information by using a secure repository.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
5
VI. CONCLUSION
This proposed system splits the secret information depending on the priority and importance
of users sharing the secret. Weighted splitting of the secret is considered a new method that enhances
the authentication of parties by granting the most trusted users the more secret information. Another
important point in this system is that it takes into account the most common problem in the
traditional methods which is the absence of the other users that pose the low weights of information
secret. This problem is solved by designing a protected repository containing the corresponding set
of low weight pieces for each user of high weight secret pieces of information. Finally, this method
uses a new parameter which is (w) to the original secret splitting method.
REFERENCES
[1] A. Shamir, How to share a secret, Commun. ACM, vol. 22, pp.612–613, 1979.
[2] G. R. Blakley, Safeguarding cryptographic keys, in Amer. Fed. Inf. Process. Soc. Conf. Proc.,
1979, pp. 313–317.
[3] E. D. Karnin, J. W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Trans. Inf.
Theory, vol. 29, no. 1, pp. 35–41, Jan. 1983.
[4] Li Bai and Xukai Zou, A proactive secret sharing scheme in matrix projection method,
International Journal of Security and Networks, 4(2):15–23, 2009.
[5] M. Franklin and M. Yung, Communication complexity of secure computation. STOC, pages
699–710, 1992.
[6] H. Ghodosi, J. Pieprzyk, and R. Safavi-Naini. Secret sharing in multilevel and
compartmented groups. Lecture Notes in Computer Science, 1438:367–378, 1998.
[7] J. He and E. Dawson. Multistage secret sharing based on one-way function. Electronics
Letters, 30:1591–1592, 1994.
[8] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to
cope with perpetual leakage. Lecture Notes in Computer Science, 963:339–352, 1995.
[9] S. Iftene. General secret sharing based on the Chinese remainder theorem with applications in
e-voting. Electronic Notes in Theoretical Computer Science, 186:67–84, 2007.
[10] I. Ingemarsson and G. J. Simmons. A protocol to set up shared secret schemes without the
assistance of mutually trusted party. Lecture Notes in Computer Science, 473:266–282, 1991.
[11] K. M. Martin, J. Pieprzyk, R. Safavi-Naini, and H. Wang. Changing thresholds in the absence
of secure channels. Lecture Notes in Computer Science, 1587:177–191, 1999.
[12] M. Mignotte. How to share a secret. Lecture Notes in Computer Science, 149:371–375, 1983.
[13] Liaojun Pang, Huixian Li, Ye Yao, and Yumin Wang. A verifiable (t,n) multiple secret
sharing scheme and its analyses. 2008 International Symposium on Electronic Commerce and
Security, pages 22–26, 2008.
[14] T. P. Pedersen. non-interactive and information theoretic secure verifiable secret sharing.
Lecture Notes in Computer Science, 576:129–140,
[15] M. Quisquater, B. Preneel, and J. Vandewalle. On the security of the threshold scheme based
on the chinese remainder theorem. in Proc. Of PKC 2002, Lecture Notes in Computer
Science, 2274:199–210, 2002.
[16] Ron Steinfelda, Josef Pieprzyka, and Huaxiong Wang. Lattice-based threshold-changeability
for standard crt secret-sharing schemes. Finite Fields and Their Applications, 12:653–680,
2006.
[17] Ron Steinfelda, Josef Pieprzyka, and Huaxiong Wang. Lattice-based threshold changeability
for standard shamir secret-sharing schemes. IEEE Transactions on Information Theory,
53:2542–2559, 2007.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME
6
[18] P. Morillo,C. Padró, G. Sáez and J.L. Villar , Weighted threshold secret sharing schemes ,
ELSEVIER , Volume 70, Issue 5, 21 June 1999, Pages 211–216
[19] Z. Ye, Z. Fang ,C. Wang &F. Meng, Design and realization of threshold secret sharing
scheme with random weights , Journal of Systems Engineering and Electronics , Vol. 20, No.
5, 2009, pp.1091–1095.
[20] Z. Yanshuo and L. Zhuojun , Dynamic and Verifiable Secret Sharing Among Weighted
Participants , Journal of Systems Science and Complexity ,Volume 20, Number 4 (2007),
481-485, DOI:
[21] S, Iftene and M. Grindei, Weighted Threshold RSA Based on the Chinese Remainder
Theorem, 26-29 Sept. 2007, Page(s): 175 – 181.
[22] X.Qiao,J. Zhang and R. Li, Secret sharing scheme among weighted participants based on
adversary structure, Computer Engineering and Applications, 2011, 47(7): 82-84.
[23] Y. Liu,Z. Li and T. Xue , Secret sharing among weighted participants in elliptic curve,
Computer Engineering and Applications, 2011, 47(18): 112-113.
[24] Y. XiaoYang and L.Zhen, The Short Share Secret Sharing Agreement with Matrix
Factorization, Conference, 19-20 Dec. 2009.
[25] Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, “Analysing Secure Image Secret
Sharing Schemes Based on Steganography”, International Journal of Computer Engineering
& Technology (IJCET), Volume 4, Issue 2, 2013, pp. 172 - 178, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

More Related Content

What's hot

Dimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional DataDimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional Data
International Journal of Engineering Inventions www.ijeijournal.com
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving data
iaemedu
 
Is this document relevant probably
Is this document relevant probablyIs this document relevant probably
Is this document relevant probably
unyil96
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109
IJRAT
 

What's hot (18)

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
Dimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional DataDimensionality Reduction for Classification with High-Dimensional Data
Dimensionality Reduction for Classification with High-Dimensional Data
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
A MIXTURE MODEL OF HUBNESS AND PCA FOR DETECTION OF PROJECTED OUTLIERS
A MIXTURE MODEL OF HUBNESS AND PCA FOR DETECTION OF PROJECTED OUTLIERSA MIXTURE MODEL OF HUBNESS AND PCA FOR DETECTION OF PROJECTED OUTLIERS
A MIXTURE MODEL OF HUBNESS AND PCA FOR DETECTION OF PROJECTED OUTLIERS
 
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manets
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text Documents
 
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving data
 
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK
 
Is this document relevant probably
Is this document relevant probablyIs this document relevant probably
Is this document relevant probably
 
Ijnsa050202
Ijnsa050202Ijnsa050202
Ijnsa050202
 
Cb pattern trees identifying
Cb pattern trees  identifyingCb pattern trees  identifying
Cb pattern trees identifying
 
An approximate possibilistic
An approximate possibilisticAn approximate possibilistic
An approximate possibilistic
 
Paper id 212014109
Paper id 212014109Paper id 212014109
Paper id 212014109
 

Viewers also liked

Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
Analysis of grease lubricated isoviscous elastic point contacts-2-3-4Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
IAEME Publication
 
Investigation of significance in phase transformation of powder metallurgy steel
Investigation of significance in phase transformation of powder metallurgy steelInvestigation of significance in phase transformation of powder metallurgy steel
Investigation of significance in phase transformation of powder metallurgy steel
IAEME Publication
 
Statistical methods to optimize process parameters to minimmize
Statistical methods to optimize process parameters to minimmizeStatistical methods to optimize process parameters to minimmize
Statistical methods to optimize process parameters to minimmize
IAEME Publication
 
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
IAEME Publication
 
Hybrid method to compress slices of 3 d medical images
Hybrid method to compress slices of 3 d medical imagesHybrid method to compress slices of 3 d medical images
Hybrid method to compress slices of 3 d medical images
IAEME Publication
 
Ftp and database statistics in wireless network environment for web client 2
Ftp and database statistics in wireless network environment for web client 2Ftp and database statistics in wireless network environment for web client 2
Ftp and database statistics in wireless network environment for web client 2
IAEME Publication
 
Navigation system by using gis and gps
Navigation system by using gis and gpsNavigation system by using gis and gps
Navigation system by using gis and gps
IAEME Publication
 
An empirical study on customers attitude towards service level and brand
An empirical study on customers attitude towards service level and brandAn empirical study on customers attitude towards service level and brand
An empirical study on customers attitude towards service level and brand
IAEME Publication
 
Electrochemical studies of anionic and cationic surfactants in photogalvanic
Electrochemical studies of anionic and cationic surfactants in photogalvanicElectrochemical studies of anionic and cationic surfactants in photogalvanic
Electrochemical studies of anionic and cationic surfactants in photogalvanic
IAEME Publication
 
Comparative performance and emission charactristics of 4 cylinder 4- stroke
Comparative performance and emission charactristics of 4 cylinder 4- strokeComparative performance and emission charactristics of 4 cylinder 4- stroke
Comparative performance and emission charactristics of 4 cylinder 4- stroke
IAEME Publication
 
Estatuto da criança e do adolescente
Estatuto da criança e do adolescenteEstatuto da criança e do adolescente
Estatuto da criança e do adolescente
ACS PM RN
 
Tomasena
TomasenaTomasena
Tomasena
cyc1234
 
Cnl regulamento 2012-2013_nv
Cnl regulamento 2012-2013_nvCnl regulamento 2012-2013_nv
Cnl regulamento 2012-2013_nv
bibdjosei
 
Capitulo 2
Capitulo 2Capitulo 2
Capitulo 2
rulo2186
 

Viewers also liked (20)

Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
Analysis of grease lubricated isoviscous elastic point contacts-2-3-4Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
Analysis of grease lubricated isoviscous elastic point contacts-2-3-4
 
Investigation of significance in phase transformation of powder metallurgy steel
Investigation of significance in phase transformation of powder metallurgy steelInvestigation of significance in phase transformation of powder metallurgy steel
Investigation of significance in phase transformation of powder metallurgy steel
 
Statistical methods to optimize process parameters to minimmize
Statistical methods to optimize process parameters to minimmizeStatistical methods to optimize process parameters to minimmize
Statistical methods to optimize process parameters to minimmize
 
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...Optimal placement and sizing of ht shunt capacitors for transmission loss min...
Optimal placement and sizing of ht shunt capacitors for transmission loss min...
 
Hybrid method to compress slices of 3 d medical images
Hybrid method to compress slices of 3 d medical imagesHybrid method to compress slices of 3 d medical images
Hybrid method to compress slices of 3 d medical images
 
Ftp and database statistics in wireless network environment for web client 2
Ftp and database statistics in wireless network environment for web client 2Ftp and database statistics in wireless network environment for web client 2
Ftp and database statistics in wireless network environment for web client 2
 
Navigation system by using gis and gps
Navigation system by using gis and gpsNavigation system by using gis and gps
Navigation system by using gis and gps
 
An empirical study on customers attitude towards service level and brand
An empirical study on customers attitude towards service level and brandAn empirical study on customers attitude towards service level and brand
An empirical study on customers attitude towards service level and brand
 
Application of qr 2-3-4
Application of qr 2-3-4Application of qr 2-3-4
Application of qr 2-3-4
 
Electrochemical studies of anionic and cationic surfactants in photogalvanic
Electrochemical studies of anionic and cationic surfactants in photogalvanicElectrochemical studies of anionic and cationic surfactants in photogalvanic
Electrochemical studies of anionic and cationic surfactants in photogalvanic
 
Comparative performance and emission charactristics of 4 cylinder 4- stroke
Comparative performance and emission charactristics of 4 cylinder 4- strokeComparative performance and emission charactristics of 4 cylinder 4- stroke
Comparative performance and emission charactristics of 4 cylinder 4- stroke
 
A.L.I..C.E.
A.L.I..C.E.A.L.I..C.E.
A.L.I..C.E.
 
Retrospectiva: Comportamento 2010
Retrospectiva: Comportamento 2010Retrospectiva: Comportamento 2010
Retrospectiva: Comportamento 2010
 
Estatuto da criança e do adolescente
Estatuto da criança e do adolescenteEstatuto da criança e do adolescente
Estatuto da criança e do adolescente
 
Tomasena
TomasenaTomasena
Tomasena
 
Cnl regulamento 2012-2013_nv
Cnl regulamento 2012-2013_nvCnl regulamento 2012-2013_nv
Cnl regulamento 2012-2013_nv
 
P L A N E J A M E N T O 2011.1
P L A N E J A M E N T O 2011.1P L A N E J A M E N T O 2011.1
P L A N E J A M E N T O 2011.1
 
Capitulo 2
Capitulo 2Capitulo 2
Capitulo 2
 
Vanessa duarte de carvalho
Vanessa duarte de carvalhoVanessa duarte de carvalho
Vanessa duarte de carvalho
 
Tema Blog: O Desafiao de Aprender.
Tema Blog: O Desafiao de Aprender.Tema Blog: O Desafiao de Aprender.
Tema Blog: O Desafiao de Aprender.
 

Similar to A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18

Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologies
eSAT Journals
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Eswar Publications
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
IAEME Publication
 

Similar to A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18 (20)

A ramp code for fine grained access control
A ramp code for fine grained access controlA ramp code for fine grained access control
A ramp code for fine grained access control
 
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLA RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
journal for research
journal for researchjournal for research
journal for research
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologies
 
Mapping of genes using cloud technologies
Mapping of genes using cloud technologiesMapping of genes using cloud technologies
Mapping of genes using cloud technologies
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
Agglomerative Clustering Onvertically Partitioned Data–Distributed Database M...
 
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO... PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
 
Resource Monitoring Algorithms Evaluation For Cloud Environment
Resource Monitoring Algorithms Evaluation For Cloud EnvironmentResource Monitoring Algorithms Evaluation For Cloud Environment
Resource Monitoring Algorithms Evaluation For Cloud Environment
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
 
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
 
130509
130509130509
130509
 
130509
130509130509
130509
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 

More from IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

A new weighted secret splitting method 2-3-4-5-6-7-8-9-10-11-12-13-14-15-16-17-18

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 1 A NEW WEIGHTED SECRET SPLITTING METHOD 1 Dr. Abdulameer Khalaf Hussain, 2 Dr. Mohammad Alnabhan, 3 Prof. Faris M.AL-Athari 1 Computer Science, Faculty of Information Technology, Jerash University, Jordan 2 Computer Science, Faculty of Information Technology, Jerash University, Jordan 3 Department of Mathematics, Faculty of Information Technology, Zarqa University, Jordan ABSTRACT This paper presents a new method for splitting a secret information method according to the importance role of each party in a group of users. The splitting procedure takes the secret information with a suitable length computed in terms of the number of users and their corresponding weights. Therefore, this method grants an amount of information with respect to each user’s weight. All previous methods of secret splitting methods did not take into account the user’s priority so the secret splitting may the same as the length of that secret. This paper also presents a solution for the problem of the user’s absence and the lost secret part which is considered a major problem in most of secret splitting methods. KEYWORDS: Threshold Cryptography, Secret Splitting, Secret Sharing, Weighted Authentication. I. INTRODUCTION A secret sharing scheme is any method that can be used to distribute shares of a secret value among a set of participants. The recovering of the secret value can be done only by qualified subsets of participants from their shares. Such a scheme is called a perfect scheme if the unqualified subsets do not obtain any information about the secret value. The qualified subsets form the access structure of the scheme, which is a monotone increasing family of subsets of participants. The first secret sharing was introduced independently by Shamir [1] and Blakley [2] in 1979. They proposed two different methods for constructing secret sharing schemes used for threshold access structures. In these two schemes, the qualified subsets are those with at least some given number of participants. Such schemes are ideal. i.e., the length of every share is the same as the length of the secret, which is the best possible condition [3]. A secret sharing scheme can be used as a fundamental method in secure multiparty computations which is found in [1,2], where a secret is divided into different shares for distribution among participants (private data), and a subset of participants then cooperate in order to recover the INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 6, September – October 2013, pp. 01-06 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 2 secret. Shamir proposed the (t, n)-threshold secret sharing scheme .In this scheme, the secret is divided into n shares to be distribution among certain players. The shares can be constructed such that any t participants can combine their shares to recover the secret, but any set of t -1 participants have no knowledge about the secret. Since the concept of the early secret sharing which was proposed by Shamir in 1979 [1] (Blakley also did the similar work at that time [2]), there have been many papers extending Shamir’s scheme and investigating new secret sharing schemes [4], [5], [6], [7], [8], [9],[10], [11], [12], [13], [14], [15], [16], [17]. Secret sharing schemes can be classified into various categories according to different criteria. There are two classes (in terms of numbers of secrets to be shared): single secret and multiple secrets. When we consider the shares’ capabilities, there are two classes: same-weight shares and weighted shares. In weighted shares schemes, different shares have different capabilities to recover the secret(s)–a more weighted share needs fewer other shares and a less weighted share needs more other shares to recover the secret(s). Also secret sharing can be classified depending on the underlying techniques used: polynomial based schemes and Chinese Remainder Theorem (CRT) based schemes. Shamir’s scheme [1] is considered a well –known example polynomial based scheme and Mignotte’s scheme [12] is a representative among the CRT based secret sharing schemes. II. RELATED WORKS In [18] a proposal deals with weighted threshold schemes. This method concentrates mainly about the properties related to the information rate. The paper presents the complete characterization of the access structures of weighted threshold schemes when all the minimal authorized subsets have at most two elements. Finally this paper gave the lower bounds for the optimal rate of these access structures. In [19] a construction of a new threshold secret sharing scheme is made by using the concept of share vector. In this scheme, the number of shareholders can be adjusted by randomly changing the weights of them. This proposed system was more suitable in the case that the number of shareholders needs to be changed randomly during the scheme is carrying out. Z. Yanshuo and L. Zhuojun proposed a secret sharing scheme of shared participants. In this scheme, based on identity, the secret sharing scheme among weighted participants was analyzed and a dynamic scheme about secret sharing among weighted participants was presented [20]. Another scheme was proposed to combine the weighted threshold secret sharing schemes based on the Chinese remainder theorem with the RSA scheme. The aim of this scheme was to obtain a novelty, weighted threshold decryption or weighted threshold digital signature generation.[21] In [22] a secret sharing scheme constructed on adversary structure was proposed based on Chinese remainder theorem .This scheme is considered a prefect secret sharing scheme and it poses a reconstruction property and confidentiality property which leads efficiently for prevention of attacking from external attackers and cheating among participants. Another important property of this scheme is that allowing participants to be added or deleted dynamically. A scheme among different weights based on Shamir's secret sharing and Chinese remainder theorem was proposed. Because of introducing a public –key cryptosystem in elliptic curve in this scheme, this method did not suffer from any cheating and also a secret channel is not needed to build between the participants and distributors. [23] In [24] the authors used the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting forward an algorithm of (r, n) threshold secret sharing with short
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 3 share and high efficiency. In this scheme, the length of secret share that each participator needs to conserve has no relation with the length of the secret information. So this scheme has a very high space, computation and communication efficiency. III. PRPOPSED SYSTEM The proposed system of secret splitting in this paper presents a new and a variable decomposition of secret information. The length of the secret information(S) is chosen depending on the number of users and their corresponding weights and represented in binary string. This binary string is divided into amounts depending on the weight (w) of each user in such a way that the larger amount of the binary string is dedicated to the user of the higher weight. This piece of the secret binary information must be discarded from the original binary string and apply the same splitting procedure to the next lower weight. To perform this task, this paper suggests a set of users and two sets of corresponding weights, one for the highest weights and the other for the lower weights. These two sets can be used to provide a partial solution to the problem of the absence of one or more users of lower priorities by giving certain privileges to the users of the high weights. This task needs a trusted manager to distribute the shares of other users to those of higher weights. For this reason, the manager must agree with the latter users with public and private keys to encrypt the distributed shares of lower weights in the location of users with high weights. The latter users can be able to extract these shares in the case of absence or the lost of the lower weights shares. The proposed system assumes a secret splitting system with a new parameter that is (t,n,m) , where t is the total number of users , n the number of users that can reconstruct the secret information and m is the percentage of secret splitting depending on the weight of each user . THE ALGORITHM Let S be the binary secret information Let L be the length of S Let G={U1,U2,…….Un) be the set of group users Let WH={wh1,wh2,…..,whm} be the set of high weights Let WL ={wl1,wl2,…..,wlk} be the set of low weights Let WT=WhUWL such that: Wh1>wh2…>whm>whl1>wh2…>whk Let t be the total of users Let n be the selected users responsible for recovering the secret S Let m be the percentage dedicated for each weight Calculate the length of S : L= t*n*m Divide S into variable divisions s1 ,s2 ,…..sn For i=1 to n Si=S *wi(m) // The first share is calculated by multiplying S with the percentage of each user // S= (S-Si) // The new S is calculated by subtracting S from the fist share and we now deal with the remaining of S to take a percentage of the next user // Next i To perform this system it is necessary to construct two tables. The first table (table1) contains the users of high weights and their corresponding weights and the second table (table 2) is dedicated for users of low weights and their weights.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 4 Table 1: Users of high weights User Weight Uh1 Wh1 Uh2 Wh2 . . . . . . Uhn Whn Table 2 : Users of low weights User Weight Ul1 Wl1 Ul2 Wl2 . . . . . . Uln Wnn IV. RESULTS We take an example of some authenticated users with high weights and the corresponding users of low weights in order to reconstruct the secret information in the case of the absence of users of low weights .In this example we have 5 users of low weights. Table 3 represents a sample of a secure repository used for this purpose. Table 3: Repository Sample User Weight Corresponding users of low weights Uh1 Wh1 WL1={Ul1,Ul2,Ul3} Uh2 Wh2 WL2={ Ul4,Ul5 } Where WL1 and WL2 represent the sets of users of low weights. So the user (Uh1) of the first high weight can reconstruct the total secret information by using information pieces dedicated to Ul1,Ul2 and Ul3 of low weights in cooperation with user (Uh2) who can extract information pieces of users Ul4 and Ul5 . V. ANALYSIS Splitting secrets according to the weights or priories of some users in a variable splitting shared secrets leads to a more strong authentication mechanism , because the large pieces of secret information is dedicated to those users who are more trusted than other users who have less amount of secret information . Also, this proposed system lets the users of higher weights to recover the total secret information in the case of the absence of the users of lower priorities. In this case we overcome the major problem found in most splitting methods which is the absence of these users sharing the secret information by using a secure repository.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 5 VI. CONCLUSION This proposed system splits the secret information depending on the priority and importance of users sharing the secret. Weighted splitting of the secret is considered a new method that enhances the authentication of parties by granting the most trusted users the more secret information. Another important point in this system is that it takes into account the most common problem in the traditional methods which is the absence of the other users that pose the low weights of information secret. This problem is solved by designing a protected repository containing the corresponding set of low weight pieces for each user of high weight secret pieces of information. Finally, this method uses a new parameter which is (w) to the original secret splitting method. REFERENCES [1] A. Shamir, How to share a secret, Commun. ACM, vol. 22, pp.612–613, 1979. [2] G. R. Blakley, Safeguarding cryptographic keys, in Amer. Fed. Inf. Process. Soc. Conf. Proc., 1979, pp. 313–317. [3] E. D. Karnin, J. W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Trans. Inf. Theory, vol. 29, no. 1, pp. 35–41, Jan. 1983. [4] Li Bai and Xukai Zou, A proactive secret sharing scheme in matrix projection method, International Journal of Security and Networks, 4(2):15–23, 2009. [5] M. Franklin and M. Yung, Communication complexity of secure computation. STOC, pages 699–710, 1992. [6] H. Ghodosi, J. Pieprzyk, and R. Safavi-Naini. Secret sharing in multilevel and compartmented groups. Lecture Notes in Computer Science, 1438:367–378, 1998. [7] J. He and E. Dawson. Multistage secret sharing based on one-way function. Electronics Letters, 30:1591–1592, 1994. [8] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or: How to cope with perpetual leakage. Lecture Notes in Computer Science, 963:339–352, 1995. [9] S. Iftene. General secret sharing based on the Chinese remainder theorem with applications in e-voting. Electronic Notes in Theoretical Computer Science, 186:67–84, 2007. [10] I. Ingemarsson and G. J. Simmons. A protocol to set up shared secret schemes without the assistance of mutually trusted party. Lecture Notes in Computer Science, 473:266–282, 1991. [11] K. M. Martin, J. Pieprzyk, R. Safavi-Naini, and H. Wang. Changing thresholds in the absence of secure channels. Lecture Notes in Computer Science, 1587:177–191, 1999. [12] M. Mignotte. How to share a secret. Lecture Notes in Computer Science, 149:371–375, 1983. [13] Liaojun Pang, Huixian Li, Ye Yao, and Yumin Wang. A verifiable (t,n) multiple secret sharing scheme and its analyses. 2008 International Symposium on Electronic Commerce and Security, pages 22–26, 2008. [14] T. P. Pedersen. non-interactive and information theoretic secure verifiable secret sharing. Lecture Notes in Computer Science, 576:129–140, [15] M. Quisquater, B. Preneel, and J. Vandewalle. On the security of the threshold scheme based on the chinese remainder theorem. in Proc. Of PKC 2002, Lecture Notes in Computer Science, 2274:199–210, 2002. [16] Ron Steinfelda, Josef Pieprzyka, and Huaxiong Wang. Lattice-based threshold-changeability for standard crt secret-sharing schemes. Finite Fields and Their Applications, 12:653–680, 2006. [17] Ron Steinfelda, Josef Pieprzyka, and Huaxiong Wang. Lattice-based threshold changeability for standard shamir secret-sharing schemes. IEEE Transactions on Information Theory, 53:2542–2559, 2007.
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 6 [18] P. Morillo,C. Padró, G. Sáez and J.L. Villar , Weighted threshold secret sharing schemes , ELSEVIER , Volume 70, Issue 5, 21 June 1999, Pages 211–216 [19] Z. Ye, Z. Fang ,C. Wang &F. Meng, Design and realization of threshold secret sharing scheme with random weights , Journal of Systems Engineering and Electronics , Vol. 20, No. 5, 2009, pp.1091–1095. [20] Z. Yanshuo and L. Zhuojun , Dynamic and Verifiable Secret Sharing Among Weighted Participants , Journal of Systems Science and Complexity ,Volume 20, Number 4 (2007), 481-485, DOI: [21] S, Iftene and M. Grindei, Weighted Threshold RSA Based on the Chinese Remainder Theorem, 26-29 Sept. 2007, Page(s): 175 – 181. [22] X.Qiao,J. Zhang and R. Li, Secret sharing scheme among weighted participants based on adversary structure, Computer Engineering and Applications, 2011, 47(7): 82-84. [23] Y. Liu,Z. Li and T. Xue , Secret sharing among weighted participants in elliptic curve, Computer Engineering and Applications, 2011, 47(18): 112-113. [24] Y. XiaoYang and L.Zhen, The Short Share Secret Sharing Agreement with Matrix Factorization, Conference, 19-20 Dec. 2009. [25] Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, “Analysing Secure Image Secret Sharing Schemes Based on Steganography”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 172 - 178, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.