Browse > Article
http://dx.doi.org/10.7236/JIIBC.2017.17.4.35

Private Key Management Scheme Using Secret Sharing and Steganography  

Lee, Jaeheung (Department of Computer & Information Security, Daejeon University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.17, no.4, 2017 , pp. 35-41 More about this Journal
Abstract
This paper introduces a new method for storing a private key. This method can be achieved by dividing the private key into "n" pieces by a (k, n) secret sharing method, and then storing each piece into photo files utilizing a steganography method. In this way, a user can restore a private key as long as he can remember the locations of "k" photos among the entire photo files. Attackers, meanwhile, will find it extremely difficult to extract the private key if a user has hidden the pieces of the private key into numerous photo files stored in the system. It also provides a high degree of user convenience, as the user can restore the private key from his memory of k positions among n photo files. Coupled with this, a certain level of security can be guaranteed because the attacker cannot restore a private key, even if he knows k-1 photo file locations.
Keywords
Private Key; Secret Sharing Scheme; Steganography; Certificate; Bitcoin;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 5280, May (2008). DOI: https://doi.org/10.17487/RFC5280   DOI
2 S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, http://bitcoin.org/bitcoin.pdf, (2009).
3 T. Moore and C. Nicolas, Beware the middleman: Empirical analysis of Bitcoin-exchange risk, International Conference on Financial Cryptography and Data Security, Springer Berlin Heidelberg, (2013). DOI: https://doi.org/10.1007/978-3-642-39884-1_3   DOI
4 B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0, RFC 2898, September (2000). DOI: https://doi.org/10.17487/RFC2898   DOI
5 B. Kaliski, PKCS #8: Private-Key Information Syntax Specification Version 1.2, RFC 5208, May (2008). DOI: https://doi.org/10.17487/RFC5208   DOI
6 Mike Caldwell and Aaron Voisine, Passphrase-protected private key, https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki.
7 Andreas M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies, O'Reilly Media, Inc., (2014).
8 Adi Shamir, How to share a secret, Communications of the ACM, Volume 22, Issue 11, Pages 612-613, Nov. (1979). DOI: https://doi.org/10.1145/359168.359176   DOI
9 Hie-Do Kim, A Study on the Secure Double Pipe Hash Function, The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 10, No. 6, pp. 201-208, Dec 2010. DOI: https://doi.org/10.7236/JIIBC.2010.12.201.
10 Hyung-Kyu Yang, A Fast and Secure Method to Preserve Anonymity in Electronic Voting, The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 14, No. 1, pp. 245-251, Feb 2014. DOI: https://doi.org/10.7236/JIIBC.2014.02.245.   DOI
11 Jessica Fridrich, Miroslav Goljan, and Rui Du, Detecting LSB steganography in color, and gray-scale images, IEEE multimedia, Volume 8, Issue 4, Pages 22-28, (2001). DOI: https://doi.org/10.1109/93.959097   DOI
12 Jessica Fridrich, Tomas Pevny, and Jan Kodovsky, Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, In Proceedings of the 9th workshop on Multimedia & security (MM&Sec '07), ACM, New York, NY, USA, 3-14, (2007). DOI: https://doi.org/10.1145/1288869.1288872   DOI
13 D. Upham, Jsteg, http://www.securityfocus.com/tools/1434, (1997).
14 Ralph Norman Haber, How we remember what we see, Scientific American, Volume 222, Issue 5, Pages 103-112, May (1970).
15 R. Dhamija, A. Perrig, Deja Vu: User study using images for authentication, In Ninth Usenix Security Symposium, (2000).
16 L. Standing, J. Conezio, and R.N. Haber, Perception and memory for pictures: Single-trial learning of 2500 visual stimuli, Psychonomic Science, Volume 19, Issue 2, Pages 73-74, (1970).   DOI