On the Security of Encrypted Secret Sharing

Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for c...

Full description

Saved in:
Bibliographic Details
Published in:2013 46th Hawaii International Conference on System Sciences pp. 4966 - 4975
Main Authors: Braun, J., Wiesmaier, A., Buchmann, J.
Format: Conference Proceeding
Language:English
Published: IEEE 01-01-2013
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for combining arbitrary encryption algorithms. The scheme has the following properties: (1) It is a (k, n)-threshold scheme, i.e. only k=n of then applied algorithms are needed for decryption. (2) The scheme's effective bit security is the sum of the lengths of the k shortest keys. (3) Under adaptive chosen plaintext attacks, this security level remains intact until at least k algorithms are compromised. (4) Under adaptive chosen chipertext attacks, the security level decreases with each compromised algorithm at most by the corresponding key length. (5) The scheme increases the effective key lengths of repeatedly applied encryption algorithms.
AbstractList Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption, and information theoretic schemes suffer from several weaknesses or serious disadvantages that we shortly discuss. We present a method for combining arbitrary encryption algorithms. The scheme has the following properties: (1) It is a (k, n)-threshold scheme, i.e. only k=n of then applied algorithms are needed for decryption. (2) The scheme's effective bit security is the sum of the lengths of the k shortest keys. (3) Under adaptive chosen plaintext attacks, this security level remains intact until at least k algorithms are compromised. (4) Under adaptive chosen chipertext attacks, the security level decreases with each compromised algorithm at most by the corresponding key length. (5) The scheme increases the effective key lengths of repeatedly applied encryption algorithms.
Author Braun, J.
Buchmann, J.
Wiesmaier, A.
Author_xml – sequence: 1
  givenname: J.
  surname: Braun
  fullname: Braun, J.
  email: jbraun@cdc.informatik.tu-darmstadt.de
– sequence: 2
  givenname: A.
  surname: Wiesmaier
  fullname: Wiesmaier, A.
  email: awiesmaier@agtinternational.com
– sequence: 3
  givenname: J.
  surname: Buchmann
  fullname: Buchmann, J.
  email: buchmann@cdc.informatik.tu-darmstadt.de
BookMark eNotjD1PwzAUAA0UiVCysrBkRwnv2X7-GFFVaKVKHQJz5SbPNAjSyglD_j3iYzrpTrprMeuPPQtxi1Ahgn9YrRd1XUlAVWlpzkTurQNrPGnnJZyLTJKVpXFGXvw21MYq8krZmciQFJRogK5EPgzvAICgCJXOxP22L8YDFzU3X6kbp-IYi2XfpOk0cvtjE49FfQip699uxGUMHwPn_5yL16fly2JVbrbP68XjpuzQ0lgyxNY6Jq1NNNozWt63jXJNkM4G0m00pEzj5J6Cp5ZIttZAgMhRImOj5uLu79sx8-6Uus-Qpp3RDrTW6huefUgG
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HICSS.2013.426
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9780769548920
076954892X
EISSN 2572-6862
EndPage 4975
ExternalDocumentID 6480444
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
JC5
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-e0fd78e5446f649e17ebdc38ca287a54df6536c82b5a95d552d760a0fef21e1c3
IEDL.DBID RIE
ISBN 9781467359337
1467359335
ISSN 1530-1605
IngestDate Wed Jun 26 19:23:08 EDT 2024
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-e0fd78e5446f649e17ebdc38ca287a54df6536c82b5a95d552d760a0fef21e1c3
PageCount 10
ParticipantIDs ieee_primary_6480444
PublicationCentury 2000
PublicationDate 2013-Jan.
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: 2013-Jan.
PublicationDecade 2010
PublicationTitle 2013 46th Hawaii International Conference on System Sciences
PublicationTitleAbbrev hicss
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001035134
ssj0020416
Score 1.8787158
Snippet Sensitive electronic data must often be kept confidential over very long periods of time. Known solutions such as conventional encryption, cascaded encryption,...
SourceID ieee
SourceType Publisher
StartPage 4966
SubjectTerms Adaptive systems
Ciphers
Encryption
encryption combiner
long-term security
perfect secret sharing
Polynomials
Random variables
security amplification
strongly ideal secrecy
Title On the Security of Encrypted Secret Sharing
URI https://ieeexplore.ieee.org/document/6480444
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ09T8MwEIZPtBMshbaIb3lgg7RObMfOXFqVBZACElvl2GeJJa1KO_Dvsd30Y2BhS6wMkS3r3jv7nhfgPi1cEOIsMdqphFcqIG9TlghHVZVnVtHoWjIt5cunehoHTM7jrhcGEePlMxyEx3iWb-dmHUplw5yrgDdrQUsWatOrta-nhCOxgDprki3Ko-2p39A0Sb1mj01duWTCZ_Biy3pq3mVDc0xpMZw-j8oyXPliAx6ICweeKzHkTDr_-9lT6O9798jbLiqdwRHWXehszRtIs5e7cHJAIuzBw2tNvBQkZWNnR-aOjGuz_Fl4RRpGl7giAe7sv-7Dx2T8PpomjY9C8uXFwSpB6qxUKHzm53JeYCqxsoYpo_0qacGtywXLjcoqoQthhciszKmmDl2WYmrYObTreY0XQFBhIZS2lDnBs0rqDLWP8F52FoxzQy-hF2ZittigMmbNJFz9PXwNx1l0lwgVjRtor5ZrvIXWt13fxcX9BR-Zmyc
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ09T8MwEIYtWgZgKbRFfOOBDdI6sR07c2mVilKQUiS2KrHPEktalXbg32O76cfAwpZYGSJb1r139j0vQg9hYpwQp4HKjQxYIR3yNqQBN0QWcaQl8a4laSbGn_K57zA5T9teGADwl8-g4x79Wb6eqZUrlXVjJh3erIYOOROxWHdr7Soq7lDMwc6qdIswb3xqtzQJQqvafVtXLCi3OTzf0J6qd1HxHEOSdNNhL8vcpS_aYY65sOe64oPOoPG_3z1F7V33Hn7fxqUzdABlEzU29g242s1NdLLHImyhx7cSWzGIs8rQDs8M7pdq8TO3mtSNLmCJHd7Zft1GH4P-pJcGlZNC8GXlwTIAYrSQwG3uZ2KWQCig0IpKldt1yjnTJuY0VjIqeJ5wzXmkRUxyYsBEIYSKnqN6OSvhAmGQkHCZa0INZ1Eh8ghyG-Ot8EwoY4pcopabiel8DcuYVpNw9ffwPTpKJ6-j6Wg4frlGx5H3mnD1jRtUXy5WcItq33p15xf6F4ZUnng
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+46th+Hawaii+International+Conference+on+System+Sciences&rft.atitle=On+the+Security+of+Encrypted+Secret+Sharing&rft.au=Braun%2C+J.&rft.au=Wiesmaier%2C+A.&rft.au=Buchmann%2C+J.&rft.date=2013-01-01&rft.pub=IEEE&rft.isbn=9781467359337&rft.issn=1530-1605&rft.eissn=2572-6862&rft.spage=4966&rft.epage=4975&rft_id=info:doi/10.1109%2FHICSS.2013.426&rft.externalDocID=6480444
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-1605&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-1605&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-1605&client=summon