Title :
Security evaluation of proactive secret sharing cryptosystem
Author_Institution :
Coll. of Inf. Eng., Yangzhou Univ., Yangzhou, China
Abstract :
The proactive secret sharing (PSS) scheme divides the lifetime of a secret into a series of time periods, in which the shares are periodically updated without changing the secret. This paper proposes a practical method for evaluating and analyzing the security of PSS cryptosystem. Based on the response of server to the mobile attack, we apply the stochastic modeling techniques to depict the state transition of PSS cryptosystem, transferring from secure states to the compromised states. With the relationship of security to the threshold, the time period and the intrusion rate, an evaluation of security is obtained. The simulation figures show that the method is practical and applicable.
Keywords :
Markov processes; cryptography; exponential distribution; Markov chain; PSS cryptosystem; exponential distribution; intrusion rate; mobile adversary; mobile attack; proactive secret sharing cryptosystem; security evaluation; state transition; stochastic modeling technique; time period; Communication system control; Cryptography; Data security; Educational institutions; Engineering management; Information security; Law; Legal factors; Stochastic processes; Time sharing computer systems; Markov chain; mobile adversary; proactive secret sharing; security evaluation;
Conference_Titel :
Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on
Conference_Location :
Sanya
Print_ISBN :
978-1-4244-4247-8
DOI :
10.1109/CCCM.2009.5268108