Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

PATS: Let Parties Have a Say in Threshold Group Key Sharing

View through CrossRef
We present a password‐authenticated (2, 3)‐threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure. The innovative perspective of the PATS mechanism that makes a difference from the standard secret‐sharing schemes is that it involves parties in the generation of the shares. PATS allows parties to communicate securely to establish their shares over insecure channels. Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol. PATS takes advantage of zero‐knowledge proofs compared to well‐known threshold key exchange schemes and will tolerate the existence of semi‐trusted parties. We present two variants of PATS, centralized and distributed, and then generalize PATS to ( t , n )‐threshold scheme. PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing. In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.
Institution of Engineering and Technology (IET)
Title: PATS: Let Parties Have a Say in Threshold Group Key Sharing
Description:
We present a password‐authenticated (2, 3)‐threshold group key share (PATS) mechanism.
Although PATS resembles threshold secret sharing schemes, it has a different structure.
The innovative perspective of the PATS mechanism that makes a difference from the standard secret‐sharing schemes is that it involves parties in the generation of the shares.
PATS allows parties to communicate securely to establish their shares over insecure channels.
Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol.
PATS takes advantage of zero‐knowledge proofs compared to well‐known threshold key exchange schemes and will tolerate the existence of semi‐trusted parties.
We present two variants of PATS, centralized and distributed, and then generalize PATS to ( t , n )‐threshold scheme.
PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing.
In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.

Related Results

A MINLP Model for Optimal Localization of Pumps as Turbines in Water Distribution Systems Considering Power Generation Constraints
A MINLP Model for Optimal Localization of Pumps as Turbines in Water Distribution Systems Considering Power Generation Constraints
Pressure reducing valves (PRVs) are commonly used for pressure control in water distribution systems (WDSs) by means of dissipating the pressure excess. The use of pumps as turbine...
Młodociani sprawcy przestępstw przeciwko mieniu
Młodociani sprawcy przestępstw przeciwko mieniu
The new Polish penal legislation of 1969 introduced special rules of criminal liability of young adult offenders' aged 17-20. In 1972 criminological research was undertaken in orde...
Traducción y adaptación cultural al español del cuestionario PATS
Traducción y adaptación cultural al español del cuestionario PATS
Durante estos dos últimos años la pandemia originada por la COVID-19 ha tenido consecuencias fatales para el turismo, llevando a los investigadores y expertos a buscar soluciones a...
Internal Democracy in Pakistani Religious Parties: A Comparative Analysis of Jamiat-e-Ulema Islam and Jamaat-e-Islami
Internal Democracy in Pakistani Religious Parties: A Comparative Analysis of Jamiat-e-Ulema Islam and Jamaat-e-Islami
Democratization is an important phenomenon in the contemporary world. An important feature of modern representative democracy is the emergence of political parties, as these are re...
The impact of employees’ relationships on tacit knowledge sharing
The impact of employees’ relationships on tacit knowledge sharing
Purpose– This paper aims to study the impact of individual relationships on tacit knowledge sharing in the company setting of compulsory bond, expressive bond, instrumental bond an...

Back to Top