Space-Efficient Verifiable Secret Sharing
Space-Efficient Verifiable Secret Sharing
Verifiable
Secret
Sharing
Using Polynomial Interpolation
Abstract:
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a
cryptographic primitive for the distribution of a secret among a group of n
participants designed so that only subsets of shareholders of cardinality 0 < t n
are allowed to reconstruct the secret by pooling their shares, can help mitigating
and minimizing the problem. A desirable feature of Secret Sharing schemes is
cheater detection, i.e. the ability to detect one or more malicious shareholders
trying to reconstruct the secret by obtaining legal shares from the other
shareholders while providing them with fake shares. Verifiable Secret Sharing
schemes solve this problem by allowing shareholders verifying the others shares.
We present new verification algorithms providing arbitrary secret sharing schemes
with cheater detection capabilities, and prove their space efficiency with regard to
other schemes appeared in the literature. We also introduce, in one of our schemes,
the Exponentiating Polynomial Root Problem (EPRP), which is believed to be NPIntermediate and therefore difficult
Algorithm:
verification algorithms:
providing arbitrary secret sharing schemes with cheater detection
capabilities, and prove their space efficiency with regard
to other schemes appeared in the literature
Encryption:
Modules:
The system is proposed to have the following modules along with
functional requirements.
Security and Privacy Protection,,
Cryptographic controls,,,
Verification,
Register:
In This Module New User Register The Information In The Order Of The
List For Client Porpose
Login:
In This Module User Can Login By Using His/Her Name And Key
Cryptographic controls:
Encryption is the process of transforming readable information into
something unreadable using an algorithm (or cipher) and a cryptographic key. The
input into the process is often referred to as the plaintext and the output is known
as the ciphertext. The reverse process, used to recover the plaintext is known as
decryption. Broadly speaking, there are two types of encryption: symmetric (or
private-key) encryption and asymmetric (or public-key) encryption.
Verification:
verification protocols that does not even require storing public data for verification;
our schemes can be used in conjunction with arbitrary secret sharing schemes, and
provide cheater detection capabilities; we also introduce, in one of our schemes, a
SYSTEM SPECIFICATION
Hardware Requirements:
System
Hard Disk
: 40 GB.
Monitor
: 14 Colour Monitor.
Mouse
: Optical Mouse.
Ram
: 1 GB.
Software Requirements:
Operating system
Coding Language
: Java AWT,Swings,Networking
Data Base
: My Sql / MS Access.
Documentation
: MS Office
IDE
Development Kit
: Eclipse Galileo
: JDK 1.6