The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Ching-Yun LEE, Yi-Shiung YEH, Deng-Jyi CHEN, Kuo-Lung KU, "A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet" in IEICE TRANSACTIONS on Information,
vol. E83-D, no. 2, pp. 190-199, February 2000, doi: .
Abstract: The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.
URL: https://global.ieice.org/en_transactions/information/10.1587/e83-d_2_190/_p
Copy
@ARTICLE{e83-d_2_190,
author={Ching-Yun LEE, Yi-Shiung YEH, Deng-Jyi CHEN, Kuo-Lung KU, },
journal={IEICE TRANSACTIONS on Information},
title={A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet},
year={2000},
volume={E83-D},
number={2},
pages={190-199},
abstract={The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.},
keywords={},
doi={},
ISSN={},
month={February},}
Copy
TY - JOUR
TI - A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet
T2 - IEICE TRANSACTIONS on Information
SP - 190
EP - 199
AU - Ching-Yun LEE
AU - Yi-Shiung YEH
AU - Deng-Jyi CHEN
AU - Kuo-Lung KU
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Information
SN -
VL - E83-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2000
AB - The use of Internet for various business applications and resource sharing has grown tremendously over the last few years. Internet security has become an important issue for both academic and industrial sectors. Much related network security research has been conducted such as user authentication, data confidentiality, and data integrity. In some applications, a critical document can be divided into pieces and allocated in different locations over the Internet for security access concern. To access such an important document, one must reconstruct the divided pieces from different locations under the given Internet environment. In this paper, a probability model for reconstructing secret sharing and algorithms to perform share assignment are presented. Also, an evaluation algorithm to measure the probability of secret sharing reconstruction is proposed. Illustrative examples and simulation results are provided to demonstrate the applicability of our method.
ER -