Quantum password sharing scheme using trusted servers

نویسنده

  • Gabriela Mogos
چکیده

Received Nov 23 th , 2012 Accepted Dec 28 th , 2012 The main purpose of the sharing schemes based on trusted servers is to obtain a password. The threshold cryptography aims the secret cryptographic protection, and is based on the distribution of the key on several servers, with the purpose to tolerate the attacks. In this work I will present a quantum version of the password sharing protocol, using a number n of trustful servers, to assure its security. The model I propose approaches the issue of the distribution of the authentication key between a client and n-1 servers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on...

متن کامل

Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct t...

متن کامل

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model

In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t, n) (formalized by Bagherzandi et al. [2]), a user Alice stores secret information among n servers so that she can later recover the information solely on the basis of her password. The security requirement is similar to a (t, n)-threshold secret sharing, i.e., Alice can recover her secret as long as she can communicate wit...

متن کامل

Robust Password-Protected Secret Sharing

Password-protected secret sharing (PPSS) schemes allow a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. In particular, this secret will remain safe as long as not too many servers get corrupted. However, servers are not always reliable and ...

متن کامل

TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF

We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme to date. A (t, n)-threshold PPSS, introduced by Bagherzandi et al. [4], allows a user to share a secret among n servers so that the secret can later be reconstructed by the user from any subset of t+ 1 servers with the sole knowledge of a password. It is guaranteed that any coalition of up to t corrupt servers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013