Preview

Science. Innovations. Technologies

Advanced search

Method for Performing a Decoding Operation in a Threshold Mrma Cryptosystem of Secret Separation with Masking Transformation

Abstract

Introduction: the article proposes a new method for recovering a spatially shared secret within the threshold principle based on sets of partial secrets belonging to subscriber groups, the number of which is limited from below by a specified threshold. Materials and methods of the research: to reduce the time spent on performing this operation, minimally redundant modular arithmetic (MRMA) is used as a computer arithmetic base. Unlike non-redundant analogs, MRMA possesses more efficient non-modular procedures, which makes it possible to optimize the decoding operation in the threshold MRMA-crypto-scheme of secret sharing. The results of the research and their discussion: a distinctive feature of the developed approach is the use of change areas for the original secret, which are rings of residues in moduli of the form of powers of 2. This greatly simplifies the decoding operation performed by the binary exponential division method. Conclusions: due to the noted features, the developed method for reconstructing the original secret using secret-mask codes surpasses the non-redundant counterparts by at least times (l is the number of subscribers restoring the original secret). At l = 7÷ 40, а (6.15 ÷ 34,65) - fold increase in productivity is achieved.

About the Authors

A. A. Kolyada
Belarusian State University
Russian Federation


M. G. Babenko
North-Caucasus Federal University
Russian Federation


S. Yu. Protasenia
Belarusian State University
Russian Federation


References

1. Червяков Н.И. и др. Применение искусственных нейронных сетей и системы остаточных классов в криптографии. М.: Физматлит, 2012. 280 с.

2. Червяков Н.И., Коляда А.А., Ляхов П.А. и др. Модулярная арифметика и ее приложения в инфокоммуникационных технологиях. М.: ФИЗМАТЛИТ, 2017. 400 с.

3. Харин Ю.С. и др. Криптология: учебник// Мн.: БГУ, 2013. 511 с.

4. Shamir Adi. How to share a secret // Communications of the ACM. 1979. Vol. 22, №11. P. 612-613.

5. Blakley G.R. Safe guarding cryptographic keys // Proc. Of the 1979 AFIPS national computer conference. Montvale: AFIPS press, 1979. P. 313-317.

6. Mignotte M. How to share a secret // Lecture notes in computer science. 1983. Vol. 149. P. 371-375.

7. Asmuth C.A., Bloom J. A modular appoach to key safe guarding // IEEE Tras. On information theory. 1983. Vol. 29, N. 2. P. 208-210.

8. Шнайер Б. Алгоритмы разделения секрета. Схема интерполяционных полиномов Лагранжа // Прикладная криптография. Протоколы, алгоритмы, исходные тексты на языке Си. Н.: Триумф, 2002. С. 588-589.

9. Shiong Jian Shyu, Ying-Ru Chen. Treshold secret image sharing by Chinese remainder theorem // IEEE Asia - Pacific Services Computing conference. Yilan, Taiwan, 9-12 dec, 2008. Vol. 1. P. 13321337.

10. Bahramian Mojtaba, Khadijeh Eslami. An efficient threshold verifiable multisecret sharing scheme using generalized Jacobean of elliptic curves // Journal of algebraic structures and their applications. 2017. Vol. 4, Iss. 2. P. 45-55.

11. Jia Xingxing, Daoshun Wang, Daxin Nie, Xiangyang Luo, Jonathan Zheng Sun. A new threshold changeable secret sharing scheme based on the Chinese remainder theorem // Information sciences. 2019. Vol. 473. P. 13-30.

12. Коляда A.A., Кучинский П.В., Червяков Н.И. Пороговый метод разделения секрета на базе избыточных модулярных вычислительных структур // Информационные технологии. Т. 25, № 9. М.: Новые технологии, 2019. С. 553-561.

13. Коляда А.А., Пак И/Т. Модулярные структуры конвейерной обработки цифровой информации // Мн.: Университетское, 1992. 256 с.

14. Коляда А.А. Обобщенная интегрально-характеристическая база модулярных систем счисления // Информационные технологии. 2017. Т. 23, №9. М.: Новые технологии, 2017. С. 641-649.

15. Ananda Mohan P.V. Residue number systems: Theory and applications. Basel: Birghauser, Mathematics, 2016. 351 p.


Review

For citations:


Kolyada A.A., Babenko M.G., Protasenia S.Yu. Method for Performing a Decoding Operation in a Threshold Mrma Cryptosystem of Secret Separation with Masking Transformation. Science. Innovations. Technologies. 2020;(3):7-22. (In Russ.)

Views: 59


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2308-4758 (Print)