Skip to main content

Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries

  • Chapter
  • First Online:
Intelligent Computing and Communication Systems

Abstract

Secret-key negotiations are important that enable any user to achieve information security as well as data privacy. Two efficient key negotiation schemes, which provide base security for developing different cryptographic techniques, are proposed. We work with Shamir’s (t, n) threshold secret sharing scheme (SSS) and provide protection against misbehaved activities of dealer and/or dishonest participants as they exist in the scheme unfortunately. The first SSS is designed based on subset secret such that if the reconstructed secret belongs to this set, then probably, no share cheating is occurred. The other scheme has two variations―(1) a dealer-based (t, t) SS and (2) a KGC-based (t, n) SS, where shares’ cheating and both dealer and shares’ cheating are protected as key generation center (KGC) is cryptographically trusted and used in variety of security applications. As performance study, a comparison of the proposed SSSs with Shamir’s one is given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li S, Zhuge JW, Li X (2013) Study on BGP security. Chin J Softw 24(1):121–138

    Article  Google Scholar 

  2. Saini H, Rao YS, Panda TC (2012) Cyber-crimes and their impacts: a review. Int J Eng Res Appl (IJERA) 2(2):202–209. ISSN: 2248–9622

    Google Scholar 

  3. Lagazio M et al (2014) A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput Secur Elsevier 45:58–74

    Article  Google Scholar 

  4. Kim J, Tong L, Thomas RJ (2014) Dynamic attacks on power systems economic dispatch. In: 48th Asilomar conference on signals, systems and computers, IEEE, pp 345–349

    Google Scholar 

  5. Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79:17373–17401

    Article  Google Scholar 

  6. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theor IT-22(6):644–654

    Google Scholar 

  7. Shamir A (1979) How to share a secret. Commun ACM 22:612–613

    Google Scholar 

  8. Tompa M, Woll H (1989) How to share a secret with cheaters. J Cryptol 1:133–138

    Article  MathSciNet  Google Scholar 

  9. Harn L, Lin C (2009) Detection and identification of cheaters in (t, n) secret sharing scheme. Des Codes Cryptograph ACM Dig Libr 52:15–24

    Article  MathSciNet  Google Scholar 

  10. Biswas AK, Dasgupta M (2020) Cryptanalysis and enhancement of Harn-Lin’s secret sharing scheme with cheating detection. In: 2020 1st international conference on power, control and computing technologies (ICPC2T), Raipur, India, pp. 27–31. https://doi.org/10.1109/ICPC2T48082.2020.9071470

  11. Fujii Y, Tada M, Hosaka N, Tochikubo K, Kato T (2005) A Fast (2, n)-Threshold scheme and its application. CSS 2005:631–636

    Google Scholar 

  12. Tassa T (2007) Hierarchical threshold secret sharing. J Cryptol 20(2):237–264

    Article  MathSciNet  Google Scholar 

  13. Concone F, Lo Re G, Morana MSMCP (2020) A secure mobile crowd sensing protocol for fog-based applications. Hum Cent Comput Inf Sci 10:28

    Article  Google Scholar 

  14. Biswas AK, Dasgupta M (2020) Two polynomials based (t, n) threshold secret sharing scheme with cheating detection. Cryptologia:1–14. https://doi.org/10.1080/01611194.2020.1717676

  15. Li C, Xu C, Zhao Y, Chen K, Zhang X (2020) Certificateless identity-concealed authenticated encryption under multi-KGC. In: Liu Z, Yung M (eds) Information security and cryptology. Inscrypt 2019. Lecture notes in computer science, vol 12020. Springer, Cham

    Google Scholar 

  16. Sun H, Li L, Zhang J, Huang W (2020) An improved dynamic certificateless authenticated asymmetric group key agreement protocol with trusted KGC. In: Tian Y, Ma T, Khan M (eds) Big data and security. ICBDS 2019. Communications in computer and information science, vol 1210. Springer, Singapore

    Google Scholar 

  17. Boneh D, Franklin M (2003) Identity-based encryption from the Weil pairing. SIAM J Comput 32(3):586–615

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Biswas, A.K., Dasgupta, M. (2021). Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries. In: Singh, B., Coello Coello, C.A., Jindal, P., Verma, P. (eds) Intelligent Computing and Communication Systems. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-16-1295-4_11

Download citation

Publish with us

Policies and ethics