TY - JOUR
T1 - RASSS
T2 - A hijack-resistant confidential information management scheme for distributed systems
AU - Bu, Lake
AU - Isakov, Mihailo
AU - Kinsy, Michel A.
N1 - Publisher Copyright:
© 2019 Institution of Engineering and Technology. All rights reserved.
PY - 2019/5/1
Y1 - 2019/5/1
N2 - In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among the devices. It is also generally the case that this piece of information cannot be entrusted to any individual device since the malfunction or compromising of one node could jeopardize the security of the entire system. Even if the information is split among the devices, there is still a risk when an attacker can compromise a group of them. Therefore we have designed and implemented a secure and robust secret sharing scheme to enable a more resilient sharing of confidential information. This solution provides three important features: (i) it uses threshold secret sharing to split the information into shares to be kept by all devices in the system; so the information can only be retrieved collaboratively by groups of devices; (ii) it guarantees the privacy of the confidential information under a certain number of passive hijacking attacks; and (iii) it ensures the integrity of the confidential information against any number of hijackers who actively and collusively attack the devices. It is able to identify all the compromised devices, while still keeping the secret unforgeable to attackers.
AB - In distributed systems there is often a need to store and share sensitive information (e.g., encryption keys, digital signatures, login credentials etc.) among the devices. It is also generally the case that this piece of information cannot be entrusted to any individual device since the malfunction or compromising of one node could jeopardize the security of the entire system. Even if the information is split among the devices, there is still a risk when an attacker can compromise a group of them. Therefore we have designed and implemented a secure and robust secret sharing scheme to enable a more resilient sharing of confidential information. This solution provides three important features: (i) it uses threshold secret sharing to split the information into shares to be kept by all devices in the system; so the information can only be retrieved collaboratively by groups of devices; (ii) it guarantees the privacy of the confidential information under a certain number of passive hijacking attacks; and (iii) it ensures the integrity of the confidential information against any number of hijackers who actively and collusively attack the devices. It is able to identify all the compromised devices, while still keeping the secret unforgeable to attackers.
UR - http://www.scopus.com/inward/record.url?scp=85065675075&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85065675075&partnerID=8YFLogxK
U2 - 10.1049/iet-cdt.2018.5167
DO - 10.1049/iet-cdt.2018.5167
M3 - Article
AN - SCOPUS:85065675075
SN - 1751-8601
VL - 13
SP - 243
EP - 249
JO - IET Computers and Digital Techniques
JF - IET Computers and Digital Techniques
IS - 3
ER -