One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that t...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:0b583c532bc445e0b675ce9c17a48c9c |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:0b583c532bc445e0b675ce9c17a48c9c2021-11-18T00:10:58ZOne Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems2169-353610.1109/ACCESS.2021.3124637https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c2021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9597553/https://doaj.org/toc/2169-3536The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that the secret can be reconstructed by a well-defined part of them. The proposed system represents an extension of this mechanism, since it is designed to be applied systematically: each user has his/her key, through which temporary keys (One Time User Keys) are generated and are used to divide the secret, corresponding to the real encryption key. The system also overcomes the concept of numerical threshold (i.e., at least n participants are required to reconstruct the secret), allowing the definition, for each encryption, of which users can access and which specific groups of users can access. The proposed model can be applied both in distributed user-based contexts and as an extension of cryptographic functions, without impacting the overall security of the system. It addresses some requirements of the European Union Council resolution on encryption and also provides a wide possibility of applications in user-based distributed systems.Stefano GalantucciDonato ImpedovoGiuseppe PirloIEEEarticleSecret sharingone time keycryptographysecret splittingauthenticationmultiple cryptographyElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 148521-148534 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Secret sharing one time key cryptography secret splitting authentication multiple cryptography Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Secret sharing one time key cryptography secret splitting authentication multiple cryptography Electrical engineering. Electronics. Nuclear engineering TK1-9971 Stefano Galantucci Donato Impedovo Giuseppe Pirlo One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
description |
The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that the secret can be reconstructed by a well-defined part of them. The proposed system represents an extension of this mechanism, since it is designed to be applied systematically: each user has his/her key, through which temporary keys (One Time User Keys) are generated and are used to divide the secret, corresponding to the real encryption key. The system also overcomes the concept of numerical threshold (i.e., at least n participants are required to reconstruct the secret), allowing the definition, for each encryption, of which users can access and which specific groups of users can access. The proposed model can be applied both in distributed user-based contexts and as an extension of cryptographic functions, without impacting the overall security of the system. It addresses some requirements of the European Union Council resolution on encryption and also provides a wide possibility of applications in user-based distributed systems. |
format |
article |
author |
Stefano Galantucci Donato Impedovo Giuseppe Pirlo |
author_facet |
Stefano Galantucci Donato Impedovo Giuseppe Pirlo |
author_sort |
Stefano Galantucci |
title |
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
title_short |
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
title_full |
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
title_fullStr |
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
title_full_unstemmed |
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems |
title_sort |
one time user key: a user-based secret sharing xor-ed model for multiple user cryptography in distributed systems |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c |
work_keys_str_mv |
AT stefanogalantucci onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems AT donatoimpedovo onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems AT giuseppepirlo onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems |
_version_ |
1718425143437426688 |