The security is so important for both storing and transmitting the digital data, the choice of parameters is critical for a security system, that is, a weak parameter will make the scheme very vulnerable to attacks, for example the use of supersingular curves or anomalous curves leads to weaknesses in elliptic curve cryptosystems, for RSA cryptosystem there are some attacks for low public exponent or small private exponent. In certain circumstances the secret sharing scheme is required to decentralize the risk. In the context of the security of secret sharing schemes, it is known that for the scheme of Shamir, an unqualified set of shares cannot leak any information about the secret. This paper aims to show that the well-known Shamir’s secret sharing is not always perfect and that the uniform randomization before sharing is insufficient to obtain a secure scheme. The second purpose of this paper is to give an explicit construction of weak polynomials for which the Shamir’s (k, n) threshold scheme is insecure in the sense that there exist a fewer than k shares which can reconstruct the secret. Particular attention is given to the scheme whose threshold is less than or equal to 6. It also showed that for certain threshold k, the secret can be calculated by a pair of shares with the probability of 1/2. Finally, in order to address the mentioned vulnerabilities, several classes of polynomials should be avoided.
Publications
Security limitations of Shamir’s secret sharing. Journal of Discrete Mathematical Sciences and Cryptography [Internet]. 2022 :1-13. Publisher's VersionAbstract
.
Towards Intelligent Road Traffic Management Over a Weighted Large Graphs Hybrid Meta-Heuristic-Based Approach. Journal of Cases on Information Technology (JCIT) [Internet]. 2022;24 (3) :1-18. Publisher's VersionAbstract
.
Some Consistency Rules for Graph Matching. SN Computer Science [Internet]. 2022;3 (2) :1-16. Publisher's VersionAbstract
.
A parallel content-based image retrieval system using spark and tachyon frameworks. Journal of King Saud University - Computer and Information Sciences [Internet]. 2021;33 (2) :141-149. Publisher's VersionAbstract
.
A Reliable Behavioral Model: Optimizing Energy Consumption and Object Clustering Quality by Naïve Robots. International Journal of Swarm Intelligence Research (IJSIR) [Internet]. 2021;12 (4). Publisher's VersionAbstract
.
A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in FogIoT Healthcare Environment. The International Arab Journal of Information Technology [Internet]. 2021;18 (2). Publisher's VersionAbstract
.
Web-Based Learning Under Tacit Mining of Various Data Sources. International Journal of Emerging Technologies in Learning [Internet]. 2021;16 (16). Publisher's VersionAbstract
.
Adoption of social robots as pedagogical aids for efficient learning of second language vocabulary to children. Journal of e-Learning and Knowledge Society [Internet]. 2021;17 (3) :119-126. Publisher's VersionAbstract
.
A hierarchical formal method for performance evaluation of WSNs protocol. Computing [Internet]. 2021;103 (6) :1183-1208. Publisher's VersionAbstract
.
Performance evaluation of ODMAC protocol for WSNs powered by ambient energy. International Journal of Simulation and Process Modelling [Internet]. 2021;17 (1) :67-78. Publisher's VersionAbstract
.
A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in Fog-IoT Healthcare Environment. Int. Arab. J. Inf. Technol [Internet]. 2021;18 :464-475. Publisher's VersionAbstract
.
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors. International Journal of Information Security and Privacy (IJISP) [Internet]. 2021;15 (2) :131-144. Publisher's VersionAbstract
.
A Discrete Crow Search Algorithm for Mining Quantitative Association Rules. International Journal of Swarm Intelligence Research (IJSIR) [Internet]. 2021;12 (4) :101-124. Publisher's VersionAbstract
.
A Personalized Recommendation for Web API Discovery in Social Web of Things. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY [Internet]. 2021;18 (3 A) :438-445. Publisher's VersionAbstract
.
A Different Encryption System Based on the Integer Factorization Problem. Malaysian Journal of Computing and Applied Mathematics [Internet]. 2020;3 (1) :50-54. Publisher's VersionAbstract
.