2015
DOI: 10.3390/fi7040445
|View full text |Cite
|
Sign up to set email alerts
|

The Future Internet: A World of Secret Shares

Abstract: Abstract:The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…The secret sharing scheme used is modified Social Secret sharing scheme. The issue of confidentiality and integrity in the use of secret sharing scheme has been validated by many works in secret sharing schemes such as Abdallah and Salleh [13], Buchanan et al [14]. Since RESCUE is concentrated on Data Availability at Zero Downtime [15], the essence of the experiment is to understand all performance overheads that will impact negatively on the objective of the system so as to eliminate them or validating already known facts.…”
Section: Results and Evaluationsmentioning
confidence: 99%
“…The secret sharing scheme used is modified Social Secret sharing scheme. The issue of confidentiality and integrity in the use of secret sharing scheme has been validated by many works in secret sharing schemes such as Abdallah and Salleh [13], Buchanan et al [14]. Since RESCUE is concentrated on Data Availability at Zero Downtime [15], the essence of the experiment is to understand all performance overheads that will impact negatively on the objective of the system so as to eliminate them or validating already known facts.…”
Section: Results and Evaluationsmentioning
confidence: 99%
“…To compare the different schemes, several metrics have to be considered, according to [32], and these include the storage factor, the key management scheme, the data de-duplication option, the revoking authority, the provided security options, the computational overhead, and performance optimization. In table I, we present the comparison of the different secret sharing schemes.…”
Section: B Rabin Information Dispersal Algorithm Ida [20]mentioning
confidence: 99%
“…Fragmenting and dispersing data over multiple independent storage sites reinforces its confidentiality, integrity, and availability [1]. During the past decades, multiple fragmentation methods were defined and used in various settings [2]. These methods include but are not limited to information-theoretic secret sharing schemes [13], information dispersal algorithms [10], as well as schemes combining symmetric encryption with data fragmentation [8,12].…”
Section: Introductionmentioning
confidence: 99%