Threshold cryptography with Chinese remainder theorem
buir.advisor | Selçuk, Ali Aydın | |
dc.contributor.author | Kaya, Kamer | |
dc.date.accessioned | 2016-01-08T18:11:16Z | |
dc.date.available | 2016-01-08T18:11:16Z | |
dc.date.issued | 2009 | |
dc.description | Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2009. | en_US |
dc.description | Thesis (Master's) -- Bilkent University, 2009. | en_US |
dc.description | Includes bibliographical references leaves 84-91. | en_US |
dc.description.abstract | Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. However, no matter which algorithms are used, security depends on the secrecy of a key which is supposed to be only known by the agents in the first place. The requirement of the key being secret brings several problems. Storing a secret key on only one person, server or database reduces the security of the system to the security and credibility of that agent. Besides, not having a backup of the key introduces the problem of losing the key if a software/hardware failure occurs. On the other hand, if the key is held by more than one agent an adversary with a desire for the key has more flexibility of choosing the target. Hence the security is reduced to the security of the least secure or least credible of these agents. Secret sharing schemes are introduced to solve the problems above. The main idea of these schemes is to share the secret among the agents such that only predefined coalitions can come together and reveal the secret, while no other coalition can obtain any information about the secret. Thus, the keys used in the areas requiring vital secrecy like large-scale finance applications and commandcontrol mechanisms of nuclear systems, can be stored by using secret sharing schemes. Threshold cryptography deals with a particular type of secret sharing schemes. In threshold cryptography related secret sharing schemes, if the size of a coalition exceeds a bound t, it can reveal the key. And, smaller coalitions can reveal no information about the key. Actually, the first secret sharing scheme in the literature is the threshold scheme of Shamir where he considered the secret as the constant of a polynomial of degree t − 1, and distributed the points on the polynomial to the group of users. Thus, a coalition of size t can recover the polynomial and reveal the key but a smaller coalition can not. This scheme is widely accepted by the researchers and used in several applications. Shamir’s secret sharing scheme is not the only one in the literature. For example, almost concurrently, Blakley proposed another secret sharing scheme depending on planar geometry and Asmuth and Bloom proposed a scheme depending on the Chinese Remainder Theorem. Although these schemes satisfy the necessary and sufficient conditions for the security, they have not been considered for the applications requiring a secret sharing scheme. Secret sharing schemes constituted a building block in several other applications other than the ones mentioned above. These applications simply contain a standard problem in the literature, the function sharing problem. In a function sharing scheme, each user has its own secret as an input to a function and the scheme computes the outcome of the function without revealing the secrets. In the literature, encryption or signature functions of the public key algorithms like RSA, ElGamal and Paillier can be given as an example to the functions shared by using a secret sharing scheme. Even new generation applications like electronic voting require a function sharing scheme. As mentioned before, Shamir’s secret sharing scheme has attracted much of the attention in the literature and other schemes are not considered much. However, as this thesis shows, secret sharing schemes depending on the Chinese Remainder Theorem can be practically used in these applications. Since each application has different needs, Shamir’s secret sharing scheme is used in applications with several extensions. Basically, this thesis investigates how to adapt Chinese Remainder Theorem based secret sharing schemes to the applications in the literature. We first propose some modifications on the Asmuth-Bloom secret sharing scheme and then by using this modified scheme we designed provably secure function sharing schemes and security extensions. | en_US |
dc.description.provenance | Made available in DSpace on 2016-01-08T18:11:16Z (GMT). No. of bitstreams: 1 0003908.pdf: 447416 bytes, checksum: 3aa9f603de0799b279898177d23400e8 (MD5) | en |
dc.description.statementofresponsibility | Kaya, Kamer | en_US |
dc.format.extent | xv, 91 leaves | en_US |
dc.identifier.itemid | B117729 | |
dc.identifier.uri | http://hdl.handle.net/11693/14936 | |
dc.language.iso | English | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Threshold cryptography | en_US |
dc.subject | Secret sharing | en_US |
dc.subject | Function sharing | en_US |
dc.subject | AsmuthBloom | en_US |
dc.subject | Chinese Remainder Theorem | en_US |
dc.subject | Provable security | en_US |
dc.subject.lcc | QA76.9.A25 K39 2009 | en_US |
dc.subject.lcsh | Cryptography. | en_US |
dc.subject.lcsh | Computer security. | en_US |
dc.subject.lcsh | Computers--Access control. | en_US |
dc.subject.lcsh | Data protection. | en_US |
dc.subject.lcsh | Coding theory. | en_US |
dc.title | Threshold cryptography with Chinese remainder theorem | en_US |
dc.type | Thesis | en_US |
thesis.degree.discipline | Computer Engineering | |
thesis.degree.grantor | Bilkent University | |
thesis.degree.level | Master's | |
thesis.degree.name | MS (Master of Science) |
Files
Original bundle
1 - 1 of 1