• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Study on Threshold Scheme based Secure Secret Sharing P2P System


Cheong-Hyeon Choi, Journal of Internet Computing and Services, Vol. 23, No. 3, pp. 21-33, Jun. 2022
10.7472/jksii.2022.23.3.21, Full Text:
Keywords: Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication

Abstract

This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Cheong-Hyeon Choi (2022). Study on Threshold Scheme based Secure Secret Sharing P2P System. Journal of Internet Computing and Services, 23(3), 21-33. DOI: 10.7472/jksii.2022.23.3.21.

[IEEE Style]
C. Choi, "Study on Threshold Scheme based Secure Secret Sharing P2P System," Journal of Internet Computing and Services, vol. 23, no. 3, pp. 21-33, 2022. DOI: 10.7472/jksii.2022.23.3.21.

[ACM Style]
Cheong-Hyeon Choi. 2022. Study on Threshold Scheme based Secure Secret Sharing P2P System. Journal of Internet Computing and Services, 23, 3, (2022), 21-33. DOI: 10.7472/jksii.2022.23.3.21.