Authenticated key distribution using given set of primes for secret sharing

In recent years, Chinese remainder theorem (CRT)-based function sharing schemes are proposed in the literature. In this paper, we study systems of two or more linear congruences. When the moduli are pairwise coprime, the main theorem is known as the CRT, because special cases of the theorem were known to the ancient Chinese. In modern algebra the CRT is a powerful tool in a variety of applications, such as cryptography, error control coding, fault-tolerant systems and certain aspects of signal processing. Threshold schemes enable a group of users to share a secret by providing each user with a share. The scheme has a threshold t+1 if any subset with cardinality t+1 of the shares enables the secret to be recovered. In this paper, we are considering 2t prime numbers to construct t share holders. Using the t share holders, we split the secret S into t parts and all the t shares are needed to reconstruct the secret using CRT.

[1]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[4]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Elwyn R. Berlekamp,et al.  Algebraic coding theory , 1984, McGraw-Hill series in systems science.

[6]  T. Apostol Introduction to analytic number theory , 1976 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[10]  Eiji Okamoto,et al.  Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..

[11]  S. Srinivasan,et al.  AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION , 2013 .

[12]  R. Balakrishnan,et al.  A textbook of graph theory , 1999 .