One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems

The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that t...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:0b583c532bc445e0b675ce9c17a48c9c
record_format dspace
spelling oai:doaj.org-article:0b583c532bc445e0b675ce9c17a48c9c2021-11-18T00:10:58ZOne Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems2169-353610.1109/ACCESS.2021.3124637https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c2021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9597553/https://doaj.org/toc/2169-3536The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that the secret can be reconstructed by a well-defined part of them. The proposed system represents an extension of this mechanism, since it is designed to be applied systematically: each user has his/her key, through which temporary keys (One Time User Keys) are generated and are used to divide the secret, corresponding to the real encryption key. The system also overcomes the concept of numerical threshold (i.e., at least n participants are required to reconstruct the secret), allowing the definition, for each encryption, of which users can access and which specific groups of users can access. The proposed model can be applied both in distributed user-based contexts and as an extension of cryptographic functions, without impacting the overall security of the system. It addresses some requirements of the European Union Council resolution on encryption and also provides a wide possibility of applications in user-based distributed systems.Stefano GalantucciDonato ImpedovoGiuseppe PirloIEEEarticleSecret sharingone time keycryptographysecret splittingauthenticationmultiple cryptographyElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 148521-148534 (2021)
institution DOAJ
collection DOAJ
language EN
topic Secret sharing
one time key
cryptography
secret splitting
authentication
multiple cryptography
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Secret sharing
one time key
cryptography
secret splitting
authentication
multiple cryptography
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Stefano Galantucci
Donato Impedovo
Giuseppe Pirlo
One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
description The generation of encrypted channels between more than two users is complex, as it is necessary to share information about the key of each user. This problem has been partially solved through the secret sharing mechanism that makes it possible to divide a secret among several participants, so that the secret can be reconstructed by a well-defined part of them. The proposed system represents an extension of this mechanism, since it is designed to be applied systematically: each user has his/her key, through which temporary keys (One Time User Keys) are generated and are used to divide the secret, corresponding to the real encryption key. The system also overcomes the concept of numerical threshold (i.e., at least n participants are required to reconstruct the secret), allowing the definition, for each encryption, of which users can access and which specific groups of users can access. The proposed model can be applied both in distributed user-based contexts and as an extension of cryptographic functions, without impacting the overall security of the system. It addresses some requirements of the European Union Council resolution on encryption and also provides a wide possibility of applications in user-based distributed systems.
format article
author Stefano Galantucci
Donato Impedovo
Giuseppe Pirlo
author_facet Stefano Galantucci
Donato Impedovo
Giuseppe Pirlo
author_sort Stefano Galantucci
title One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
title_short One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
title_full One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
title_fullStr One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
title_full_unstemmed One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography in Distributed Systems
title_sort one time user key: a user-based secret sharing xor-ed model for multiple user cryptography in distributed systems
publisher IEEE
publishDate 2021
url https://doaj.org/article/0b583c532bc445e0b675ce9c17a48c9c
work_keys_str_mv AT stefanogalantucci onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems
AT donatoimpedovo onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems
AT giuseppepirlo onetimeuserkeyauserbasedsecretsharingxoredmodelformultipleusercryptographyindistributedsystems
_version_ 1718425143437426688