QSecret-Sharing Scheme (QSS)-Based Keyless: Titanium Secure (TitaniumSec) EMail Application

  • Deepthi HaridasEmail author
  • Rakesh Shukla
  • Hari Om Prakash
  • Phani Bhushan Rallapalli
  • Venkataraman Sarma
  • V. Raghu Venkatraman
  • Harshal Shah
  • Harshul Vaishnav
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1045)


Securing email, i.e. “electronic mail”, is a vast subject dealing with security against illegitimate usage. Standard methodology is to incorporate encryption techniques for securing email. This ultimately leads to securing the secret keys which are used for the secure communication. In order to facilitate secure communication, there arises a dependency on third-party devices as well as trusted third-party certifications. A third party is inappropriate to secure the keys storage and exchange from, whichever the case under consideration. The present work presents a novel keyless solution to secure email application. Keyless solution is based on QSecret-sharing scheme (QSS). The novelty of current work: (i) the integration of quasigroup in to secret-sharing scheme and (ii) introduces Titanium Secure (TitaniumSec) email application using indigenous QSS.


Shamir’s secret share (SSS) Threshold secret share (TSS) Quasigroup One-way function Verifiable secret sharing Perfect secret sharing (PSS) 


  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)Google Scholar
  2. 2.
    Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of AFIPS 1979 National Compute Conference, vol. 48, pp. 313–317. Arlington, VA (1997)Google Scholar
  3. 3.
    Simmons, G.J.: How to (really) share a secret. In: Conference on the Theory and Application of Cryptography, pp. 390–448. Springer, New York, NY (1988)Google Scholar
  4. 4.
    Pedersen, T.P.: Non interactive information theoretic secure verifiable secret sharing. In: Annual International Cryptology Conference, pp. 129–140. Springer, Berlin (1991)Google Scholar
  5. 5.
    Blakley, G.R., Kabatianskii, G.A.: Linear algebra approach to secret sharing schemes. In: Error Control, Cryptology, and Speech compression, pp. 33–40. Springer, Berlin (1994)Google Scholar
  6. 6.
    Lin, H.-Y., Yeh, Y.-S.: Dynamic multi secret sharing scheme. Int. J. Contemp. Math. Sci. 3(1), 37–42 (2008)Google Scholar
  7. 7.
    Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or How to cope with perpetual leakage. In: Annual International Cryptology Conference, pp. 339–352. Springer, Berlin (1995)Google Scholar
  8. 8.
    Cramer, R., Damgard, I., Ishai, Y.: Share conversion, pseudo random secret sharing and application to secure computation. In: Theory of Cryptography Conference, pp. 342–362. Springer, Berlin (2005)Google Scholar
  9. 9.
    Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 3, 133–138 (1989)Google Scholar
  10. 10.
    Kong, J., Zerfos, P., Luo, H., Lu, S.W., Zhang, L.: Providing robust and ubiquitous security support for mobile adhoc networks. In: ICNP. IEEE, New York (1991)Google Scholar
  11. 11.
    Tian, X.X., Sha, C.F., Wang, X.L., Zhou, A.Y.: Privacy preserving query processing on secret share based data storage. In: International Conference on Database Systems for advanced Applications, pp. 108–122. Springer, Berlin (2011)Google Scholar
  12. 12.
    Lin, C.-C., Tsai, W.-H.: Secret sharing with steganography and authentication. J. Syst. Software 73(3), 405–414 (2004)Google Scholar
  13. 13.
    Kaya, S.V., Pedersen, T.B., Savas, E., Saygiyn, Y.: Efficient privacy preserving distributed clustering based on secret sharing. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 280–291. Springer, Berlin (2007)Google Scholar
  14. 14.
    Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: Authenticated group key transfer protocol based on secret sharing. Proc. Eng. 29, 403–408 (2012)Google Scholar
  15. 15.
    Park, N., Lee, D.: Electronic identity information hiding methods using secret hsaring scheme in multimedia centric internet of things environments. Pers. Ubiquit. Comput. 22(1), 3–10 (2018)Google Scholar
  16. 16.
    Thien, C.-C., Lin, J.-C.: Secret image sharing. Comput. Graphics 26(5), 765–770 (2002)Google Scholar
  17. 17.
    Bai, L., Biswas, S., Ortiz, A., Dalessandro, D.: An image secret sharing method. In: 2006 Ninth International Conference on Information Fusion, pp. 1–6. IEEE, New York (2006)Google Scholar
  18. 18.
    Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the size for shares for secret sharing schemes. J. Cryptol. 6(3), 157–167 (1993)Google Scholar
  19. 19.
    Karnin, E., Greene, J., Hellman, M.: On secret sharing systems. IEEE Trans. Inf. Theory 29(1), 35–41 (1983)Google Scholar
  20. 20.
    Shukla, R., Prakash, H.O., Phanibhusan, R.: OpenPGP based secure web mail. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 735–738. IEEE, New York (2016)Google Scholar
  21. 21.
    Shukla, R., Prakash, H.O., Phanibhusan, R.: Pehchanmail: IBE based E-token authenticated secure email. Int. J. Recent Technol. Eng. (IJRTE) 3 (2014)Google Scholar
  22. 22.
    Shukla, R., Prakash, H.O., Phanibhusan, R., Venkataraman, S., Vardhan, G.: Sahastradhara biometric and EToken integrated secure email system. In: 2013 15th International Conference on Advanced Computing Technologies (ICACT), pp. 1–4. IEEE, New York (2013)Google Scholar
  23. 23.
    Markoviski, S., Gligoroski, D., Andova, S.: Using quasigroups for one-one secure encoding. In: Proceedings VIII Conference Logic in Computer Science, LIRA, vol. 97, pp. 157–162 (1997)Google Scholar
  24. 24.
    Scherbacov, V.A.: Quasigroups in Cryptology. arXivpreprint. arXiv: 1007.3572 (2010)
  25. 25.
    Pal, S.K., Kapoor, S., Arora, A., Chaudhary, R., Khurana, J.: Design of strong crytpographic schemes based on Latin squares. J. Discrete Math. Sci. Cryptograhy 13(3), 233–256 (2010)Google Scholar
  26. 26.
    Haridas, D., Raj, K.C.E.S., Sarma, V., Chowdhury, S.: Probabilistically generated ternary quasigroup based stream cipher. In: Progress in Intelligent Computing Techniques: Theory, Practice and Applications, pp. 158–160. Springer, Singapore (2018)Google Scholar
  27. 27.
    Scott, W.R.: Algebraically closed groups. Proc. Am. Math. Soc. 2(1), 118–121 (1951)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Deepthi Haridas
    • 1
    Email author
  • Rakesh Shukla
    • 1
  • Hari Om Prakash
    • 1
  • Phani Bhushan Rallapalli
    • 1
  • Venkataraman Sarma
    • 1
  • V. Raghu Venkatraman
    • 1
  • Harshal Shah
    • 2
  • Harshul Vaishnav
    • 2
  1. 1.Advanced Data Processing Research Institute (ADRIN), Department of SpaceGovernment of IndiaSecunderabadIndia
  2. 2.Dhirubhai Ambani Institute of Information and Communication Technology (DAIICT)Gandhi NagarIndia

Personalised recommendations