SlideShare a Scribd company logo
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Abstract:
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive
for the distribution of a secret among a group of n participants designed so that only subsets of
shareholders of cardinality 0 < t µ n are allowed to reconstruct the secret by pooling their shares,
can help mitigating and minimizing the problem. A desirable feature of Secret Sharing schemes
is cheater detection, i.e. the ability to detect one or more malicious shareholders trying to
reconstruct the secret by obtaining legal shares from the other shareholders while providing them
with fake shares. Verifiable Secret Sharing schemes solve this problem by allowing shareholders
verifying the others’ shares. We present new verification algorithms providing arbitrary secret
sharing schemes with cheater detection capabilities, and prove their space efficiency with regard
to other schemes appeared in the literature. We also introduce, in one of our schemes, the
Exponentiating Polynomial Root Problem (EPRP), which is believed to be NP-Intermediate and
therefore difficult
Algorithm:
verification algorithms:
providing arbitrary secret sharing schemes with cheater detection capabilities, and prove their
space efficiency with regard
to other schemes appeared in the literature
Encryption:
• Used to calculate the initial allocation. Every Data Encrypted
Existing System
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive
for the distribution of a secret among a group of n participants designed so that only subsets of
shareholders of cardinality 0 < t n are allowed to reconstruct the secret by pooling their shares,
can help mitigating and minimizing the problem.
Proposed System:
A desirable feature of Secret Sharing schemes is cheater detection, i.e. the ability to detect one or
more malicious shareholders trying to reconstruct the secret by obtaining legal shares from the
other shareholders while providing them with fake shares. Verifiable Secret Sharing schemes
solve this problem by allowing shareholders verifying the others’ shares. We present new
verification algorithms providing arbitrary secret sharing schemes with cheater detection
capabilities, and prove their space efficiency with regard to other schemes appeared in the
literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root
Problem (EPRP), which is believed to be NP-Intermediate and therefore difficult..
Modules:
The system is proposed to have the following modules along with functional requirements.
 Security and Privacy Protection,,
 Cryptographic controls,,,
 Verification,
Register:
In This Module New User Register The Information In The Order Of The List For Client
Porpose
Login:
In This Module User Can Login By Using His/Her Name And Key
Cryptographic controls:
Encryption is the process of transforming readable information into something
unreadable using an algorithm (or cipher) and a cryptographic key. The input into the process is
often referred to as the plaintext and the output is known as the ciphertext. The reverse process,
used to recover the plaintext is known as decryption. Broadly speaking, there are two types of
encryption: symmetric (or private-key) encryption and asymmetric (or public-key) encryption.
Verification:
verification protocols that does not even require storing public data for verification; our schemes
can be used in conjunction with arbitrary secret sharing schemes, and provide cheater detection
capabilities; we also introduce, in one of our schemes, a new computational problem, namely the
Exponentiating Polynomial Root Problem (EPRP), which generalizes the Discrete Logarithm
ProblemCommitments can be implemented via one-way functions, as a basis for verification
schemes. verification method applicable
Security and Privacy Protection
The original file can still be encrypted if required, thus providing an additional security
guarantee. The use of multiple clouds and Secret Sharing can therefore mitigate and minimize
several risks associated to the single cloud provider scenario, such as service availability failure,
data loss and/or corruption, loss of confidentiality, vender lock-in and the possibility of
malicious insiders in the single cloud
Cloud computing to Shamir’s secret sharing security can be enhanced, by making each of the n
shareholders verify the others’ shares, and assigning a different, private security parameter uj to
each verifier; in this environment, this would mean generating n different polynomials
Upload:
User Want To every File Upload Here This Module Convert To Your File Ciper Text Again
Your Process Is Completed
Download:
User Want To Download to Your File Here Its Before That Must Want To Key of the
Data File Name And Key submitted Then Your Original File is Download

More Related Content

PDF
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
DOCX
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
PDF
75227-144257-1-PB
PDF
Fire col a collaborative protection
PDF
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
Privacy preserving data sharing with anonymous id assignment
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
75227-144257-1-PB
Fire col a collaborative protection
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment

Viewers also liked (10)

DOCX
Shot List
PDF
Строительная техника Sany
PPTX
Happy Birthday Naresha Salsabila Emri
DOCX
Location floor plan
DOCX
Location and Floor Plan
DOCX
Feedback
PPSX
запись географических названий
PDF
Social Media e strategie aziendali
PPT
Event in alabama
DOCX
Annotated lyrics
Shot List
Строительная техника Sany
Happy Birthday Naresha Salsabila Emri
Location floor plan
Location and Floor Plan
Feedback
запись географических названий
Social Media e strategie aziendali
Event in alabama
Annotated lyrics
Ad

Similar to Space efficient verifiable secret sharing using polynomial interpolation (20)

DOCX
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
DOCX
Space efficient verifiable secret sharing
DOCX
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
DOCX
JAVA projects 2014
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Audit free cloud storage via deniable attribute based encryption
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
DOCX
Audit free cloud storage via deniable attribute based encryption
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PDF
Iaetsd a survey on cloud storage security with
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
DOCX
Complete document
DOCX
Control cloud data access privilege and
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space efficient verifiable secret sharing
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
JAVA projects 2014
Privacy preserving public auditing for regenerating-code-based cloud storage
Audit free cloud storage via deniable attribute based encryption
A Hybrid Cloud Approach for Secure Authorized Deduplication
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Audit free cloud storage via deniable attribute based encryption
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
Privacy preserving public auditing for regenerating-code-based cloud storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Iaetsd a survey on cloud storage security with
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Complete document
Control cloud data access privilege and
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate cryptosystem for scalable data sharing in cloud storage
Ad

More from CloudTechnologies (20)

DOCX
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
DOCX
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
DOCX
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
DOCX
Machine Learning Classification to predict water purity based on Viruses and ...
DOCX
iot based safety and health monitoring for construction workers
DOCX
Intelligent neonatal monitoring system based on android application using mul...
DOCX
An iot based smart garden with weather station system
DOCX
A deep learning facial expression recognition based scoring system for restau...
DOCX
Diabetes prediction using different machine learning approaches
DOCX
machine learning based predictive analytics of student academic performance i...
DOCX
Image based estimation of real food size for accurate food calorie estimation
DOCX
Network intrusion detection using supervised machine learning technique with ...
DOCX
Io t projects
DOCX
Cloud computing projects
DOCX
Data mining projects
DOCX
Python IEEE 2019 Projects List
DOCX
Machine learning projects
DOCX
Raspberry Pi based voice-operated personal assistant (Neobot)
DOCX
Automation in Agriculture and IoT
DOCX
Gas Leakage Detection Based on IOT
PublicEduChain A Framework for Sharing Student-Owned Educational Data on Publ...
Blockchain Based Logging to Defeat Malicious Insiders The Case of Remote Heal...
Enhancing Personalized Learning Experiences by Leveraging Deep Learning for C...
Machine Learning Classification to predict water purity based on Viruses and ...
iot based safety and health monitoring for construction workers
Intelligent neonatal monitoring system based on android application using mul...
An iot based smart garden with weather station system
A deep learning facial expression recognition based scoring system for restau...
Diabetes prediction using different machine learning approaches
machine learning based predictive analytics of student academic performance i...
Image based estimation of real food size for accurate food calorie estimation
Network intrusion detection using supervised machine learning technique with ...
Io t projects
Cloud computing projects
Data mining projects
Python IEEE 2019 Projects List
Machine learning projects
Raspberry Pi based voice-operated personal assistant (Neobot)
Automation in Agriculture and IoT
Gas Leakage Detection Based on IOT

Recently uploaded (20)

PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
1_English_Language_Set_2.pdf probationary
PDF
Trump Administration's workforce development strategy
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
HVAC Specification 2024 according to central public works department
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
1_English_Language_Set_2.pdf probationary
Trump Administration's workforce development strategy
AI-driven educational solutions for real-life interventions in the Philippine...
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
LDMMIA Reiki Yoga Finals Review Spring Summer
HVAC Specification 2024 according to central public works department
TNA_Presentation-1-Final(SAVE)) (1).pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Share_Module_2_Power_conflict_and_negotiation.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
My India Quiz Book_20210205121199924.pdf
Hazard Identification & Risk Assessment .pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Virtual and Augmented Reality in Current Scenario

Space efficient verifiable secret sharing using polynomial interpolation

  • 1. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation Abstract: Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that only subsets of shareholders of cardinality 0 < t µ n are allowed to reconstruct the secret by pooling their shares, can help mitigating and minimizing the problem. A desirable feature of Secret Sharing schemes is cheater detection, i.e. the ability to detect one or more malicious shareholders trying to reconstruct the secret by obtaining legal shares from the other shareholders while providing them with fake shares. Verifiable Secret Sharing schemes solve this problem by allowing shareholders verifying the others’ shares. We present new verification algorithms providing arbitrary secret sharing schemes with cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root Problem (EPRP), which is believed to be NP-Intermediate and therefore difficult Algorithm: verification algorithms: providing arbitrary secret sharing schemes with cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature Encryption: • Used to calculate the initial allocation. Every Data Encrypted Existing System
  • 2. Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that only subsets of shareholders of cardinality 0 < t n are allowed to reconstruct the secret by pooling their shares, can help mitigating and minimizing the problem. Proposed System: A desirable feature of Secret Sharing schemes is cheater detection, i.e. the ability to detect one or more malicious shareholders trying to reconstruct the secret by obtaining legal shares from the other shareholders while providing them with fake shares. Verifiable Secret Sharing schemes solve this problem by allowing shareholders verifying the others’ shares. We present new verification algorithms providing arbitrary secret sharing schemes with cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root Problem (EPRP), which is believed to be NP-Intermediate and therefore difficult.. Modules: The system is proposed to have the following modules along with functional requirements.  Security and Privacy Protection,,  Cryptographic controls,,,  Verification, Register: In This Module New User Register The Information In The Order Of The List For Client Porpose Login:
  • 3. In This Module User Can Login By Using His/Her Name And Key Cryptographic controls: Encryption is the process of transforming readable information into something unreadable using an algorithm (or cipher) and a cryptographic key. The input into the process is often referred to as the plaintext and the output is known as the ciphertext. The reverse process, used to recover the plaintext is known as decryption. Broadly speaking, there are two types of encryption: symmetric (or private-key) encryption and asymmetric (or public-key) encryption. Verification: verification protocols that does not even require storing public data for verification; our schemes can be used in conjunction with arbitrary secret sharing schemes, and provide cheater detection capabilities; we also introduce, in one of our schemes, a new computational problem, namely the Exponentiating Polynomial Root Problem (EPRP), which generalizes the Discrete Logarithm ProblemCommitments can be implemented via one-way functions, as a basis for verification schemes. verification method applicable Security and Privacy Protection The original file can still be encrypted if required, thus providing an additional security guarantee. The use of multiple clouds and Secret Sharing can therefore mitigate and minimize several risks associated to the single cloud provider scenario, such as service availability failure, data loss and/or corruption, loss of confidentiality, vender lock-in and the possibility of malicious insiders in the single cloud Cloud computing to Shamir’s secret sharing security can be enhanced, by making each of the n shareholders verify the others’ shares, and assigning a different, private security parameter uj to each verifier; in this environment, this would mean generating n different polynomials Upload:
  • 4. User Want To every File Upload Here This Module Convert To Your File Ciper Text Again Your Process Is Completed Download: User Want To Download to Your File Here Its Before That Must Want To Key of the Data File Name And Key submitted Then Your Original File is Download