Skip to main content

Reviewing the Role of Secret Sharing Schemes in Electronic Payment Protocols

  • Conference paper
  • First Online:
Information Systems (EMCIS 2023)

Abstract

Since e-Cash and electronic transactions consist of digital data, there are risks that this data can be easily falsified, compromising the security and efficiency of the entire electronic payment protocol. To ensure the security of the protocol, these data must be protected. This is why researchers have focused on several cryptographic studies including secret sharing. Secret sharing techniques are used to divide a secret into multiple shares and to distribute them among a group of participants. Only when a sufficient number of shares are combined together, the original secret can be reconstructed. Moreover, no information about the secret can be deducted from the shares by a smaller group.

In this paper, we investigate the different phases of an electronic payment protocol where secret sharing can be used and more particularly distributed key generation and distributed multikey generation protocols. This paper also highlights the importance of using secret sharing in enhancing the security and confidentiality of electronic payment systems, as well as the ability to prevent unauthorized access to sensitive information. The trust is shared among multiple parties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, p. 313. IEEE Computer Society (1979)

    Google Scholar 

  2. Dehez-Clementi, M., Lacan, J., Deneuville, J.C., Asghar, H., Kaafar, D.: A blockchain-enabled anonymous-yet-traceable distributed key generation. In: 2021 IEEE International Conference on Blockchain (Blockchain), p. 257–265. IEEE (2021)

    Google Scholar 

  3. Goyal, V., Kothapalli, A., Masserova, E., Parno, B., Song, Y.: Storing and retrieving secrets on a blockchain. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC 2022. LNCS, vol. 13177, pp. 252–282. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-97121-2_10

    Chapter  Google Scholar 

  4. Kalai, R., Neji, W., Ben Rajeb, N.: A distributed multi-key generation protocol with a new complaint management strategy. In: Papadaki, M., Rupino da Cunha, P., Themistocleous, M., Christodoulou, K. (eds.) EMCIS 2022. LNBIP, vol. 464, pp. 150–164. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-30694-5_12

    Chapter  Google Scholar 

  5. Kim, J., Kim, P., Choi, D., Lee, Y.: A study on the interoperability technology of digital identification based on WACI protocol with multiparty distributed signature. Sensors 23(8), 4061 (2023)

    Article  Google Scholar 

  6. Ma, T., Xu, H., Li, P.: A blockchain traceable scheme with oversight function. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds.) ICICS 2020. LNCS, vol. 12282, pp. 164–182. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61078-4_10

    Chapter  Google Scholar 

  7. Neji, W., Blibech, K., Ben Rajeb, N.: Distributed key generation protocol with a new complaint management strategy. Secur. Commun. Netw. 9(17), 4585–4595 (2016)

    Article  Google Scholar 

  8. Noh, J., Kwon, Y., Son, J., Cho, S.: Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet Things J. 10(7), 6235–6248 (2022)

    Article  Google Scholar 

  9. Ogheneruemu, A.S., Taiye, A.O.: Electronic payment system using visual cryptographic scheme

    Google Scholar 

  10. Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Cham (1991). https://doi.org/10.1007/3-540-46416-6_47

    Chapter  Google Scholar 

  11. Shalini, I., Sathyanarayana, S., et al.: A comparative analysis of secret sharing schemes with special reference to e-commerce applications. In: 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), pp. 17–22. IEEE (2015)

    Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  13. Touloupou, M., Themistocleous, M, Iosif E., Christodoulou, K.: A systematic literature review towards a blockchain benchmarking framework. IEEE Access 10, 7630–7644 (2022). https://ieeexplore.ieee.org/abstract/document/9813702/authors#authors

  14. Touloupou, M., Christodoulou, K., Inglezakis, A., Iosif, E., Themistocleous, M.: Benchmarking blockchains: the case of XRP ledger and beyond. In: Proceedings of the Fifty-third Annual Hawaii International Conference on System Sciences, (HICSS 55), 4–7 January 2022, Maui, Hawaii, USA. IEEE Computer Society, Los Alamitos (2022). https://scholarspace.manoa.hawaii.edu/bitstream/10125/80070/0586.pdf

  15. Voudouris, A., Politis, I., Xenakis, C.: Secret sharing a key in a distributed way, Lagrange vs Newton. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1–7 (2022)

    Google Scholar 

  16. Zhou, X.: Threshold cryptosystem based fair online e-cash. In: 2008 Second International Symposium on Intelligent Information Technology Application, vol. 3, pp. 692–696. IEEE (2008)

    Google Scholar 

  17. Christodoulou, K, Iosif, E., Inglezakis, A., Themistocleous, M.: Consensus crash testing: exploring ripple’s decentralization degree in adversarial environments. Future Internet 12(3), 53 (2020). https://www.mdpi.com/1999-5903/12/3/53/htm

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rym Kalai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalai, R., Neji, W., Ben Rajeb, N. (2024). Reviewing the Role of Secret Sharing Schemes in Electronic Payment Protocols. In: Papadaki, M., Themistocleous, M., Al Marri, K., Al Zarouni, M. (eds) Information Systems. EMCIS 2023. Lecture Notes in Business Information Processing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-031-56478-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56478-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56477-2

  • Online ISBN: 978-3-031-56478-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics