Abstract

In this paper, a secret sharing scheme that is based on the Parallel Pollard rho Attack of the Elliptic Curve Discrete Logarithm Problem (ECDLP) is proposed for hierarchical access structures that can be activated dynamically. The shares of the scheme are distributed across two levels of participants but the reconstruction of the secret takes place at level zero which is the central processor or the trusted party of the scheme. The scheme finds its application in the Payments System of Banks and facilitates the replacement of paper cheques with eCheques. It also provides an efficient method of processing the payments at the Clearing House of Banks.

Highlights

  • Large volumes of paper cheques are processed each day by the Clearing House of Banks

  • The initial effort at automating the payments system was the computerisation of preparing reports at the Clearing House which was followed by the introduction of magnetic ink character recognition(MICR) cheques and reader-sorter machines to count these cheques

  • Tassa’s scheme is that which uses Birkhoff’s interpolation to solve the threshold secret sharing problem over the hierarchical access structure where there is at least one participant who belongs to each level in the secret sharing scheme

Read more

Summary

PAPER SIZE

Large volumes of paper cheques are processed each day by the Clearing House of Banks. The settlements statements stored in magnetic diskettes are delivered by physical courier to the clearing house and respective banks. This has lead to reduction in time required to process the payments and a lesser percentage of mismatches at the time of tallying the results at the Clearing House at the end of transaction for each day. A possible solution to overcome this drawback is the use of eCheques or other ePayment Instruments together with secure methods of processing these instruments presented each day at the Clearing House.

SECRET SHARING
ELLIPTIC CURVES AND ECDLP
POLLARD’S RHO ATTACK ON ECDLP
COMMUNICATION MODEL
PROTOCOL
THE SCHEME FOR A SINGLE PROCESSOR
Setup A trusted entity T
ILLUSTRATION
THE SCHEME FOR THE PARALLEL PROCESSOR
SYSTEM SETUP
SHARE GENERATION
RECONSTRUCTION OF THE SECRET
Setup: A trusted entity T
Share Generation
Central Bank Server activates an authorized subset in the access structure
Each Bank Processor Bi in the chosen access structure does the following
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call