IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A 3D-Cellular Automata-Based Publicly-Verifiable Threshold Secret Sharing

A 3D-Cellular Automata-Based Publicly-Verifiable Threshold Secret Sharing
View Sample PDF
Author(s): Rosemary Koikara (Kyungpook National University, South Korea), Eun-Joon Yoon (Kyungil Univeristy, South Korea) and Anand Paul (Kyungpook National University, South Korea)
Copyright: 2020
Pages: 22
Source title: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Source Author(s)/Editor(s): Padmavathi Ganapathi (Avinashilingam Institute for Home Science and Higher Education for Women, India) and D. Shanmugapriya (Avinashilingam Institute for Home Science and Higher Education for Women, India)
DOI: 10.4018/978-1-5225-9611-0.ch013

Purchase

View A 3D-Cellular Automata-Based Publicly-Verifiable Threshold Secret Sharing on the publisher's website for pricing and purchasing information.

Abstract

In secret sharing, a secret is distributed between various participants in a manner that an authorized group of participants in the appropriate access structures can recover this secret. However, a dealer might get corrupted by adversaries and may influence this secret sharing or the reconstruction process. Verifiable secret sharing (VSS) overcomes this issue by adding a verifiability protocol to the original secret sharing scheme. This chapter discusses a computationally secure publicly verifiable secret sharing scheme constructed using the three-dimensional cellular automata (3D CA). The initial configuration of the 3D CA is the secret. The following configurations are devised to be the shares distributed among the participants. Update mechanisms and various rules make it hard for an adversary to corrupt or duplicate a share. To make it even more efficient, the authors added a verifiability layer such that a dealer posts a public share and a private share to each shareholder. The NIST test suite has been used to calculate the randomness of the shares.

Related Content

Renu Sharma, Mamta Mohan. © 2022. 25 pages.
Kirandeep Bedi, Monica Bedi, Ramanjeet Singh. © 2022. 14 pages.
Darshana Desai. © 2022. 14 pages.
Abhinav Chaturvedi, Mukesh Chaturvedi. © 2022. 16 pages.
Nidhi Shridhar Natrajan, Sanjeev Kumar Singh, Rinku Sanjeev. © 2022. 22 pages.
Shailja Dixit. © 2022. 23 pages.
Surabhi Singh, José Duarte Santos. © 2022. 12 pages.
Body Bottom