THE BLAKLEY BASED SECRET SHARING APPROACH

Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is also important. Imagine you encrypt your important files with are secret key and if such a key is lost, then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. In this paper we propose a new approach to construct Blakley's scheme by using the finite fields.

___

  • [1] Beimel, A., Chee, Y. M., Gwo, I., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C., (ed), Secret Sharing Schemes: A Study, Springer, 2011, 6639, pp. 11-46.
  • [2] Blakley, G. R., Safeguarding Cryptographic Keys, AFIPS Conf. Proc., vol. 48, pp. 313-317, 1979.
  • [3] Blakley, G. R. and Kabatianski, G. A., Linear Algebra Approach to Secret Sharing Schemes, In Proc. of Error Control, Cryptology and Speech Compression, Lecture Notes in Computer Science, vol 229, pp. 33-40, 1994.
  • [4] Bozkurt, I. N., Kaya, K., Selçuk, A. A., Güloğlu, A. M., Threshold Cryptography Based on Blakley Secret Sharing, In Proc. of Information Security and Cryptology 2008, Ankara, Turkey, Dec. 2008.
  • [5] Chen, C. C. and Fu, W. Y., A Geometry Based Secret Image Sharing Approach, Journal of Information Science and Engineering, vol. 24, no. 5, pp. 1567-1577, 2008.
  • [6] Csirmaz, L. and Tardos, G., On-line secret sharing, Cryptology ePrint Archive, Report 2011/174, 2011.
  • [7] Ebri, N. Al and Yeun, C. Y., Study on Secret Sharing Schemes (SSS) and Their Applications, 6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates, pp. 40-45, 2011.
  • [8] Iftere, S., Secret sharing schemes with applications in security protocols, Technical Report TR 07-01, University Alexandruloan Cuza of Iasi, Faculty of Computer Science, January 2007.
  • [9] Martin, K., Challenging the Adversary Model in Secret Sharing Schemes, In Coding and Cryptography II, Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts, pp. 45-63, 2008.
  • [10] Shamir, A., How to Share a Secret, Communications of the ACM, vol.22, no.11, pp.612-613, 1979.
  • [11] Tso, H. K., Sharing Secret Images Using Blakley's Concept, Optical Engineering, vol. 47, no. 7, pp. 21-23, 2008.
  • [12] Tso, R., A Study on Secret Sharing Schemes with Dishonest Dealers and Participants, University of Tsukba, January 2004.