On the Security of Encrypted Secret Sharing
Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for c...
Saved in:
Published in: | 2013 46th Hawaii International Conference on System Sciences pp. 4966 - 4975 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-01-2013
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for combining arbitrary encryption algorithms. The scheme has the following properties: (1) It is a (k, n)-threshold scheme, i.e. only k=n of then applied algorithms are needed for decryption. (2) The scheme's effective bit security is the sum of the lengths of the k shortest keys. (3) Under adaptive chosen plaintext attacks, this security level remains intact until at least k algorithms are compromised. (4) Under adaptive chosen chipertext attacks, the security level decreases with each compromised algorithm at most by the corresponding key length. (5) The scheme increases the effective key lengths of repeatedly applied encryption algorithms. |
---|---|
AbstractList | Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for combining arbitrary encryption algorithms. The scheme has the following properties: (1) It is a (k, n)-threshold scheme, i.e. only k=n of then applied algorithms are needed for decryption. (2) The scheme's effective bit security is the sum of the lengths of the k shortest keys. (3) Under adaptive chosen plaintext attacks, this security level remains intact until at least k algorithms are compromised. (4) Under adaptive chosen chipertext attacks, the security level decreases with each compromised algorithm at most by the corresponding key length. (5) The scheme increases the effective key lengths of repeatedly applied encryption algorithms. |
Author | Braun, J. Buchmann, J. Wiesmaier, A. |
Author_xml | – sequence: 1 givenname: J. surname: Braun fullname: Braun, J. email: jbraun@cdc.informatik.tu-darmstadt.de – sequence: 2 givenname: A. surname: Wiesmaier fullname: Wiesmaier, A. email: awiesmaier@agtinternational.com – sequence: 3 givenname: J. surname: Buchmann fullname: Buchmann, J. email: buchmann@cdc.informatik.tu-darmstadt.de |
BookMark | eNotjD1PwzAUAA0UiVCysrBkRwnv2X7-GFFVaKVKHQJz5SbPNAjSyglD_j3iYzrpTrprMeuPPQtxi1Ahgn9YrRd1XUlAVWlpzkTurQNrPGnnJZyLTJKVpXFGXvw21MYq8krZmciQFJRogK5EPgzvAICgCJXOxP22L8YDFzU3X6kbp-IYi2XfpOk0cvtjE49FfQip699uxGUMHwPn_5yL16fly2JVbrbP68XjpuzQ0lgyxNY6Jq1NNNozWt63jXJNkM4G0m00pEzj5J6Cp5ZIttZAgMhRImOj5uLu79sx8-6Uus-Qpp3RDrTW6huefUgG |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/HICSS.2013.426 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9780769548920 076954892X |
EISSN | 2572-6862 |
EndPage | 4975 |
ExternalDocumentID | 6480444 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAJGR ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK JC5 M43 OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-e0fd78e5446f649e17ebdc38ca287a54df6536c82b5a95d552d760a0fef21e1c3 |
IEDL.DBID | RIE |
ISBN | 9781467359337 1467359335 |
ISSN | 1530-1605 |
IngestDate | Wed Jun 26 19:23:08 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-e0fd78e5446f649e17ebdc38ca287a54df6536c82b5a95d552d760a0fef21e1c3 |
PageCount | 10 |
ParticipantIDs | ieee_primary_6480444 |
PublicationCentury | 2000 |
PublicationDate | 2013-Jan. |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-Jan. |
PublicationDecade | 2010 |
PublicationTitle | 2013 46th Hawaii International Conference on System Sciences |
PublicationTitleAbbrev | hicss |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001035134 ssj0020416 |
Score | 1.8787158 |
Snippet | Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption,... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 4966 |
SubjectTerms | Adaptive systems Ciphers Encryption encryption combiner long-term security perfect secret sharing Polynomials Random variables security amplification strongly ideal secrecy |
Title | On the Security of Encrypted Secret Sharing |
URI | https://ieeexplore.ieee.org/document/6480444 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ09T8MwEIZPtBMshbaIb3lgg7RObMfOXFqVBZACElvl2GeJJa1KO_Dvsd30Y2BhS6wMkS3r3jv7nhfgPi1cEOIsMdqphFcqIG9TlghHVZVnVtHoWjIt5cunehoHTM7jrhcGEePlMxyEx3iWb-dmHUplw5yrgDdrQUsWatOrta-nhCOxgDprki3Ko-2p39A0Sb1mj01duWTCZ_Biy3pq3mVDc0xpMZw-j8oyXPliAx6ICweeKzHkTDr_-9lT6O9798jbLiqdwRHWXehszRtIs5e7cHJAIuzBw2tNvBQkZWNnR-aOjGuz_Fl4RRpGl7giAe7sv-7Dx2T8PpomjY9C8uXFwSpB6qxUKHzm53JeYCqxsoYpo_0qacGtywXLjcoqoQthhciszKmmDl2WYmrYObTreY0XQFBhIZS2lDnBs0rqDLWP8F52FoxzQy-hF2ZittigMmbNJFz9PXwNx1l0lwgVjRtor5ZrvIXWt13fxcX9BR-Zmyc |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ09T8MwEIYtWgZgKbRFfOOBDdI6sR07c2mVilKQUiS2KrHPEktalXbg32O76cfAwpZYGSJb1r139j0vQg9hYpwQp4HKjQxYIR3yNqQBN0QWcaQl8a4laSbGn_K57zA5T9teGADwl8-g4x79Wb6eqZUrlXVjJh3erIYOOROxWHdr7Soq7lDMwc6qdIswb3xqtzQJQqvafVtXLCi3OTzf0J6qd1HxHEOSdNNhL8vcpS_aYY65sOe64oPOoPG_3z1F7V33Hn7fxqUzdABlEzU29g242s1NdLLHImyhx7cSWzGIs8rQDs8M7pdq8TO3mtSNLmCJHd7Zft1GH4P-pJcGlZNC8GXlwTIAYrSQwG3uZ2KWQCig0IpKldt1yjnTJuY0VjIqeJ5wzXmkRUxyYsBEIYSKnqN6OSvhAmGQkHCZa0INZ1Eh8ghyG-Ot8EwoY4pcopabiel8DcuYVpNw9ffwPTpKJ6-j6Wg4frlGx5H3mnD1jRtUXy5WcItq33p15xf6F4ZUnng |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+46th+Hawaii+International+Conference+on+System+Sciences&rft.atitle=On+the+Security+of+Encrypted+Secret+Sharing&rft.au=Braun%2C+J.&rft.au=Wiesmaier%2C+A.&rft.au=Buchmann%2C+J.&rft.date=2013-01-01&rft.pub=IEEE&rft.isbn=9781467359337&rft.issn=1530-1605&rft.eissn=2572-6862&rft.spage=4966&rft.epage=4975&rft_id=info:doi/10.1109%2FHICSS.2013.426&rft.externalDocID=6480444 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-1605&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-1605&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-1605&client=summon |