Abstract by anuja a sonalker on Asymmetric Key Distribution


Download 217.42 Kb.
Pdf ko'rish
bet24/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   ...   20   21   22   23   24   25   26   27   ...   43
Bog'liq
etd

3.8 Key Share Reuse 
In the classical secret sharing scheme[1], k shares are created for k servers, any t out of 
which can combine to form the coalition. This scheme does not have enough randomness 
in the key shares its possesses as the key space used here is not very large. The secret 
sharing scheme used here generates t shares for every possible combination of t-out-of-k 
servers. In other words, the Trusted Dealer would create an 2-D array of private-key 
shares of the order of 
C
k
t
x ( t +1 ). Let us consider the previous example to fully 
understand the concept of key share generation. Thus, 21 sets (
C
7
5
sets) were computed 
and a 2-D array of order 21x 6 key shares was created. Though this increases randomness 
in the available key space, it adds a large computation overhead to the key generation 
process. We therefore look for a way to reuse the number of key shares to be generated 
by sharing some of the private key shares with certain peers such that the security aspect 
is not lost or compromised[13]. Fig. 3.4(a) shows how key shares can be reused. Let us 
consider the previous example with the same array of key shares and the exact same 
setup, but by reusing key shares. Key share reuse reduces the existing number of sets 
from 
C
k
t
to {
C
k
t
div (k-t+1) +
C
k
t
mod (k-t+1)}, which can be up to 
1
+

t
k
C
k
t
if
C
k
t
mod (k-t+1) = 0. In this example, the total number of sets created was reduced from 
21 (without reuse) to 
1
5
7
21
+


3
21
= 7 with key share reuse. 
In this case, the total number of sets the TD would need to generate would now be 7 
which is a 66% decrease in computation cost in key share generation alone. The figures 
below demonstrate how the private key shares are intelligently combined to reduce the 
number of required sets. In the first set, 5 key shares are distributed to any five of the 
seven share servers, namely, S
1, 
S
2, 
S
3,
S

and S

. Since 2 servers were not given any 
shares, they can be provided with the one of the already dealt shares (d

- d
5
) in the next 
set and leaving out the share server who received that share in the previous set. Thus, in 
Set 2, d
2
was dealt to S

and S

left out of the combination. In Set 3, d

was dealt to S

and 
S

left out of the coalition. Keys can only be reused as many times as there are servers in 


31 
excess of the threshold. Since here there are only two servers in excess of the threshold
keys can be reused only twice after they initially distributed. Fig 3.4(b) is a concise way 
of representing the array shown in Fig 3.4(a). In key share reuse, care must be taken to 
ensure that no server gets two different shares for the same coalition i.e., from the same 
set. 
S
1
S
2
S
3
S
4
S
5
S
6
S
7
SS 
S
1
S
2
S
3
S
4
S
5
S
6
S
7
SS 
1 d
1
d
2
d
3
d
4
d
5
- - 
d
ss
2 d
1
- d
3
d
4
d
5
d
2

d
ss
1 d
1
d
2
d
3
d
4
d
5
d
2
d
1
d
ss
3 - d
2
d
3
d
4
d
5
- d
1
d
ss

d
10
- - d
6
d
7
d
8
d
9
d
ss
2 d
10
d
8
d
9
d
6
d
7
d
8
d
9
d
ss

d
10
- d
9
d
6
d
7
d
8

d
ss
: : : : : : : : 

: : : : : : : : : 
21 d
31
d
32
- - d
33
d
34
d
35
d
ss

7 d
31
d
32
d
31
d
32
d
33
d
34
d
35
d
ss

Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   ...   20   21   22   23   24   25   26   27   ...   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling