Browse > Article
http://dx.doi.org/10.7472/jksii.2022.23.3.21

Study on Threshold Scheme based Secure Secret Sharing P2P System  

Choi, Cheong-Hyeon (Dept. of MIS, Kwangwoon Univ.)
Publication Information
Journal of Internet Computing and Services / v.23, no.3, 2022 , pp. 21-33 More about this Journal
Abstract
This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.
Keywords
Shamir Threshold Secret Sharing; Schnorr Encryption Scheme; Collaborative Threshold Authentication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 BAE, KIM & LEE LLC, "The Report on Damage Examination of Korea Corporate Trade Secret." Korean Intellectual Property Office, 2013. https://www.korea.kr/archive/expDocView.do?docId=35443
2 Seung-gil Hong, Seung-chul Park, "A Design and Implementation of a P2P Streaming System with Considering Network Efficiency," Journal of the Korea Institute Of Information and Communication Engineering (JKIICE) Vol. 17, No. 3, 2012. http://dx.doi.org/10.6109/jkiice.2013.17.3.567   DOI
3 Zeng Degui, Yishuang Geng, "Content Distribution Mechanism in Mobile P2P Network," Journal of Networks, Vol. 9, No. 5, May 2014. https://doi.org/10.4304/jnw.9.5.1229-1236   DOI
4 Z. Xu; Y. Hu; L. Bhuyan, "Efficient server cooperation mechanism in content delivery network," 2006 IEEE International Performance Computing and Communications Conference, Phoenix, AZ, USA, 10-12 April 2006. https://doi.org/10.1109/.2006.1629436   DOI
5 Financial Services Commission, "Comprehensive Measures for Security Enhancement of Banking IT system," Policy Report, 2013. http://www.korea.kr/archive/expDocView.do?docId=34258
6 Jungeun Jee, Sangji Lee & 3, "A Logical Network Partition Scheme for Cyber Hacking and Terror Attacks," KCC2011, Journal of KISS : Information networking, Vol. 39 No. 1, 2012. https://doi.org/10.13067/jkiecs.2013.8.9.1313
7 Kang Seung-Seok, "Content Distribution Mechanism in an All-Sender-All-Receiver Ad Hoc Network," Proceeding of KFIS Autumn Conference 2005, Vol. 15, No 2, 2005. https://www.koreascience.or.kr/article/CFKO200508824091845.jsp-k1ff8j=SSMHB4&py=2012&vnc=v27n6&sp=588
8 Sergey V. Bezzateev, D.Y.Kim, "COCkS' 1[)'baSeo Scheme based Threshold Encryption Scheme," 225, 2012. http://dx.dαorlα10.37451KIPSTC2012.19C.4.225
9 Aysajan Abidin, Abdelrahaman Aly, and Mustafa A. Mustafa, "Collaborative Authentication using Threshold Cryptography," in Proc. of Emerging Technologies for Authorization and Authentication, pp. 122-137, 2019. https://doi.org/10.1007/978-3-030-39749-4_8   DOI
10 Victor Shoup, "Practical Threshold Signatures," International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2000: Advances in Cryptology pp. 207-220, 2000. https://doi.org/10.1007/3-540-45539-6_15   DOI
11 NMC consulting group, "P2P Problem and Advent of P4P," Netmanias Technical Documents, https://www.netmanias.com/ko/post/techdocs Article No. 5201, network-protocol-p2p
12 Jin Li, Philip A. Chou and Cha Zhang, "Mutualcast: An Efficient Mechanism for Content Distribution in a Peer-to-Peer (P2P) Network," 2005 IEEE International Conference on Multimedia and Expo, 2005. http:://www.cs.huji.ac.il, https://doi.org/10.1109/icme.2005.1521495
13 Cristina Perez-Sola, Jordi Herrera-Joancomarti, "The Bitcoin P2P Network," March 2014, Conference: Proceedings of the 1st Workshop on Bitcoin Research (in Assocation with Financial Crypto 14), https://10.1007/978-3-662-44774-1_7   DOI
14 Naoya Maki; Ryoichi Shinkuma, Tatsuya Mori, Noriaki Kamiyama, Ryoichi Kawahara, "A periodic combined-content distribution mechanism in peer-assisted content delivery networks," 2013 Proceedings of ITU Kaleidoscope: Building Sustainable Communities, Kyoto, Japan, 22-24 April 2013, https://doi.org/10.1109/icoin.2013.6496421   DOI
15 Keju Meng, Yue Yu, Fuyou Miao, Wenchao Huang, Yan Xion, "Threshold Changeable Secret Sharing Scheme and Its Application to Group Authentication," Information Processing Letters, Volume 157, May 2020. https://doi.org/10.1016/j.ipl.2020.105928   DOI
16 Alexandra Boldyreva, "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme." Y.G. Desmedt (Ed.): PKC 2003, LNCS 2567, pp. 31-46, 2003. cSpringer-Verlag Berlin Heidelberg 2003, https://doi.org/10.1007/3-540-36288-6_3   DOI
17 H.J. Park, K.R. Park, "P2P Technology Trend and Application to Home Network," Electronics and telecommunications trends, Vol. 21 no. 5, 2006. https://doi.org/10.22648/ETRI.2006.J.210501   DOI
18 Hyun-Jun Lee, Dae-Il Cho, Kab-Seung Kou, "A Study of Unidirectional Data Transmission System Security Model for Secure Data transmission in Separated Network," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 5, No. 6, pp. 539-547, December 2015. http://dx.doi.org/10.14257/ AJMAHS.2015.12.12   DOI