Abstract
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakley in 1979 to encode the keys of public-key cryptography by splitting them into maximally entropic shares that are distributed to participants, only revealing the secret when combined. Each new sharing instance, even of the same key, produces a different set of shares to distribute anew. This paper investigates SS as an independent cipher to secure confidential messages between a limited set of trusted participants by eliminating the need to redistribute shares. A participant’s master share is permanently fixed and unlimited temporary shares are created and combined with it to reveal new messages. Security is argued against specific and general attacks.
Similar content being viewed by others
References
Aldosary S, Howells GA (2012) robust multimodal biometric security system using the polynomial curve technique within Shamir’s Secret Sharing algorithm. In: Proceedings of Third International Conference on Emerging Security Technologies, pp 66–69
Alsolami F, Boult T (2014) CloudStash: using secret-sharing scheme to secure data, not keys, in multi-clouds. In: Proceedings of 11th International Conference on Information Technology: New Generations, pp 315–320
Asmuth M, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inform Theory 29:566–584
Ateniese G, Blundo C, De Santis A (1996) Constructions and bounds for visual cryptography. Automata, Lang Program 1099:416–428
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, pp 313–317
Buckley N, Nagar AK, Arumugam S (2014) Key-based steganographic textual secret sharing. In: Proceedings of third international conference on soft computing for problem solving, pp 25–34
Daemen J (2014) D-wave systems. http://www.dwavesys.com/d-wave-two-system
Dai S, Guo D (2015) Comparing security notions of secret sharing schemes. MDPI Entropy 17:1135–1145
Dolev S, Lahiani L, Yung M (2012) Secret swarm unit: eeactive k-secret sharing. Ad Hoc Netw 10:1291–1305
Ge L, Tang S (2008) Sharing multi-secret based on circle properties. In: Proceedings of International conference on computational intelligence and security, pp 340–344
Kafri O, Keren E (1987) Image encryption by multiple random grids. Opt Lett 12:377–379
Kaya K, Selcuk AA (2007) Threshold cryptography based on Asmuth-Bloom secret sharing 1-20
Kikuchi R, Chida K, Ikarashi D, Hamada K, Takahashi K (2013) Secret sharing schemes with conversion protocol to achieve short share-size and extendibility to multiparty computation. In: Boyd C, Simpson L (eds) Visual Cryptography and Secret Image Sharing. Springer-Verlag, Publisher, pp 419–434
Kolmogorov AN (1968) Three approaches to the quantitative definition of information. Int J Comput Math 2:157–168
Micka P (2008) http://en.algoritmy.net/article/40379/Letter-frequency-English
Mohsen T (2008) SMEmail: a new protocol for the secure E-mail in mobile environments. In: Proceedings of the Australian telecommunications networks and applications conference (ATNAC’08), pp 39–44
Muhil M, Krishna UH, Kumar RK, Mary Anita EA (2015) Securing multi-cloud using secret sharing algorithm. In: Proceedings of 2nd international symposium on big data and cloud computing (ISBCC’15), pp 421–426
Naor M, Shamir A (1994) Visual cryptography. In: Proceedings of EUROCRYPT, pp 1–12
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120–126
Shamir A (1979) How to share a secret. Commun ACM 22:612–613
Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir’s secret sharing scheme. J Syst Softw 84:341–353
Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93:977–995
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was funded by Higher Education Institutional Research (HEIR) and Liverpool Hope University. The work is patent pending, application number GB1504243.5. The authors declare no conflict of interest in this research.
Rights and permissions
About this article
Cite this article
Buckley, N., Nagar, A.K. & Arumugam, S. On the use of secret sharing as a secure multi-use pad. Innovations Syst Softw Eng 12, 215–225 (2016). https://doi.org/10.1007/s11334-016-0273-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11334-016-0273-y