Javascript must be enabled to continue!
PATS: Let Parties Have a Say in Threshold Group Key Sharing
View through CrossRef
We present a password‐authenticated (2, 3)‐threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure. The innovative perspective of the PATS mechanism that makes a difference from the standard secret‐sharing schemes is that it involves parties in the generation of the shares. PATS allows parties to communicate securely to establish their shares over insecure channels. Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol. PATS takes advantage of zero‐knowledge proofs compared to well‐known threshold key exchange schemes and will tolerate the existence of semi‐trusted parties. We present two variants of PATS, centralized and distributed, and then generalize PATS to (
t
,
n
)‐threshold scheme. PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing. In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.
Institution of Engineering and Technology (IET)
Title: PATS: Let Parties Have a Say in Threshold Group Key Sharing
Description:
We present a password‐authenticated (2, 3)‐threshold group key share (PATS) mechanism.
Although PATS resembles threshold secret sharing schemes, it has a different structure.
The innovative perspective of the PATS mechanism that makes a difference from the standard secret‐sharing schemes is that it involves parties in the generation of the shares.
PATS allows parties to communicate securely to establish their shares over insecure channels.
Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol.
PATS takes advantage of zero‐knowledge proofs compared to well‐known threshold key exchange schemes and will tolerate the existence of semi‐trusted parties.
We present two variants of PATS, centralized and distributed, and then generalize PATS to (
t
,
n
)‐threshold scheme.
PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing.
In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.
Related Results
A MINLP Model for Optimal Localization of Pumps as Turbines in Water Distribution Systems Considering Power Generation Constraints
A MINLP Model for Optimal Localization of Pumps as Turbines in Water Distribution Systems Considering Power Generation Constraints
Pressure reducing valves (PRVs) are commonly used for pressure control in water distribution systems (WDSs) by means of dissipating the pressure excess. The use of pumps as turbine...
Differences in temporal utilization patterns of dung pats among three scarabaeid dung beetles
Differences in temporal utilization patterns of dung pats among three scarabaeid dung beetles
Summary
Differences in the temporal utilization patterns of dung p...
Nociceptive disorders in patients with microvascular angina pectoris and patients with silent myocardial ischemia
Nociceptive disorders in patients with microvascular angina pectoris and patients with silent myocardial ischemia
Abstract
Funding Acknowledgements
Type of funding sources: Public Institution(s). Main funding source(s): North-western State Me...
Internal Democracy in Pakistani Religious Parties: A Comparative Analysis of Jamiat-e-Ulema Islam and Jamaat-e-Islami
Internal Democracy in Pakistani Religious Parties: A Comparative Analysis of Jamiat-e-Ulema Islam and Jamaat-e-Islami
Democratization is an important phenomenon in the contemporary world. An important feature of modern representative democracy is the emergence of political parties, as these are re...
Effects of herbal tea (Platostoma palustre) on the Hyperlipidemia in vivo
Effects of herbal tea (Platostoma palustre) on the Hyperlipidemia in vivo
Platostoma palustre jelly is a traditional food. Platostoma palustre has been used as folk medicine and is effective against heat-shock, hypertension and diabetes. Therefore, the a...
Pelatihan Teknik Merias Wajah Pesta Siang dan Pesta Malam
Pelatihan Teknik Merias Wajah Pesta Siang dan Pesta Malam
The Course was given to the teenagers which was held in the Rammang-Rammang Tourism Village, Bontoa District, Maros Regency, South Sulawesi Province. Partner groups need training o...
The impact of employees’ relationships on tacit knowledge sharing
The impact of employees’ relationships on tacit knowledge sharing
Purpose– This paper aims to study the impact of individual relationships on tacit knowledge sharing in the company setting of compulsory bond, expressive bond, instrumental bond an...
Pembrolizumab and Sarcoma: A meta-analysis
Pembrolizumab and Sarcoma: A meta-analysis
Abstract
Introduction: Pembrolizumab is a monoclonal antibody that promotes antitumor immunity. This study presents a systematic review and meta-analysis of the efficacy and safety...

