Staff View
Group-oriented secret sharing using Shamir's algorithm

Descriptive

TitleInfo
Title
Group-oriented secret sharing using Shamir's algorithm
Name (type = personal)
NamePart (type = family)
Alapati
NamePart (type = given)
Kalyan Koushik
NamePart (type = date)
1993-
DisplayForm
Kalyan Koushik Alapati
Role
RoleTerm (authority = RULIB)
author
Name (type = personal)
NamePart (type = family)
Birget
NamePart (type = given)
Jean C
DisplayForm
Jean C Birget
Affiliation
Advisory Committee
Role
RoleTerm (authority = RULIB)
chair
Name (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB)
degree grantor
Name (type = corporate)
NamePart
Camden Graduate School
Role
RoleTerm (authority = RULIB)
school
TypeOfResource
Text
Genre (authority = marcgt)
theses
OriginInfo
DateCreated (qualifier = exact)
2018
DateOther (type = degree); (qualifier = exact)
2018-01
CopyrightDate (encoding = w3cdtf); (qualifier = exact)
2018
Place
PlaceTerm (type = code)
xx
Language
LanguageTerm (authority = ISO639-2b); (type = code)
eng
Abstract (type = abstract)
In the current state of highly distributed and hybrid-cloud systems environment, managing and securing enterprise or government systems/data requires effective access control techniques and protocols. Currently, individual and independent logins using single or multi-factor passwords are widely used across the industry, but they are highly vulnerable to hacking, phishing and various password stealth techniques. For securing highly sensitive IT assets, comprehensive data management and governance programs include group-oriented login or authorization procedures, wherein a group of individuals or processes (as opposed to a single individual) provide their credentials/passwords or keys to gain access to the sensitive resource. To implement the group-oriented login, a widely acclaimed cryptographic technique, Secret Sharing, offers an elegant and secure solution. In this technique, the secret (password) is divided into multiple shares in such a way that a threshold number of shares are essential to reconstruct the secret (password). Shamir’s Secret Sharing uses this cryptographic technique, and the Secret Share splitting and reconstruction are based on a polynomial over a finite field. The goal of this thesis is to study and evaluate this technique with reference to threshold based group-login by various examples.
Subject (authority = RUETD)
Topic
Computer Science
Subject (authority = ETD-LCSH)
Topic
Computer security
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
Identifier
ETD_8582
PhysicalDescription
Form (authority = gmd)
electronic resource
InternetMediaType
application/pdf
InternetMediaType
text/xml
Extent
1 online resource (iv, 60 p. : ill.)
Note (type = degree)
M.S.
Note (type = bibliography)
Includes bibliographical references
Note (type = statement of responsibility)
by Kalyan Koushik Alapati
RelatedItem (type = host)
TitleInfo
Title
Camden Graduate School Electronic Theses and Dissertations
Identifier (type = local)
rucore10005600001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T3K077G6
Back to the top

Rights

RightsDeclaration (ID = rulibRdec0006)
The author owns the copyright to this work.
RightsHolder (type = personal)
Name
FamilyName
Alapati
GivenName
Kalyan
MiddleName
Koushik
Role
Copyright Holder
RightsEvent
Type
Permission or license
DateTime (encoding = w3cdtf); (qualifier = exact); (point = start)
2017-12-21 10:38:14
AssociatedEntity
Name
Kalyan Alapati
Role
Copyright holder
Affiliation
Rutgers University. Camden Graduate School
AssociatedObject
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
Back to the top

Technical

RULTechMD (ID = TECHNICAL1)
ContentModel
ETD
OperatingSystem (VERSION = 5.1)
windows xp
CreatingApplication
Version
1.5
ApplicationName
Microsoft® Word 2016
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-01-11T14:19:54
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2018-01-11T14:19:54
Back to the top
Version 8.3.13
Rutgers University Libraries - Copyright ©2019