Abstract
Since e-Cash and electronic transactions consist of digital data, there are risks that this data can be easily falsified, compromising the security and efficiency of the entire electronic payment protocol. To ensure the security of the protocol, these data must be protected. This is why researchers have focused on several cryptographic studies including secret sharing. Secret sharing techniques are used to divide a secret into multiple shares and to distribute them among a group of participants. Only when a sufficient number of shares are combined together, the original secret can be reconstructed. Moreover, no information about the secret can be deducted from the shares by a smaller group.
In this paper, we investigate the different phases of an electronic payment protocol where secret sharing can be used and more particularly distributed key generation and distributed multikey generation protocols. This paper also highlights the importance of using secret sharing in enhancing the security and confidentiality of electronic payment systems, as well as the ability to prevent unauthorized access to sensitive information. The trust is shared among multiple parties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, p. 313. IEEE Computer Society (1979)
Dehez-Clementi, M., Lacan, J., Deneuville, J.C., Asghar, H., Kaafar, D.: A blockchain-enabled anonymous-yet-traceable distributed key generation. In: 2021 IEEE International Conference on Blockchain (Blockchain), p. 257–265. IEEE (2021)
Goyal, V., Kothapalli, A., Masserova, E., Parno, B., Song, Y.: Storing and retrieving secrets on a blockchain. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC 2022. LNCS, vol. 13177, pp. 252–282. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-97121-2_10
Kalai, R., Neji, W., Ben Rajeb, N.: A distributed multi-key generation protocol with a new complaint management strategy. In: Papadaki, M., Rupino da Cunha, P., Themistocleous, M., Christodoulou, K. (eds.) EMCIS 2022. LNBIP, vol. 464, pp. 150–164. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-30694-5_12
Kim, J., Kim, P., Choi, D., Lee, Y.: A study on the interoperability technology of digital identification based on WACI protocol with multiparty distributed signature. Sensors 23(8), 4061 (2023)
Ma, T., Xu, H., Li, P.: A blockchain traceable scheme with oversight function. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds.) ICICS 2020. LNCS, vol. 12282, pp. 164–182. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61078-4_10
Neji, W., Blibech, K., Ben Rajeb, N.: Distributed key generation protocol with a new complaint management strategy. Secur. Commun. Netw. 9(17), 4585–4595 (2016)
Noh, J., Kwon, Y., Son, J., Cho, S.: Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks. IEEE Internet Things J. 10(7), 6235–6248 (2022)
Ogheneruemu, A.S., Taiye, A.O.: Electronic payment system using visual cryptographic scheme
Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Cham (1991). https://doi.org/10.1007/3-540-46416-6_47
Shalini, I., Sathyanarayana, S., et al.: A comparative analysis of secret sharing schemes with special reference to e-commerce applications. In: 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), pp. 17–22. IEEE (2015)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Touloupou, M., Themistocleous, M, Iosif E., Christodoulou, K.: A systematic literature review towards a blockchain benchmarking framework. IEEE Access 10, 7630–7644 (2022). https://ieeexplore.ieee.org/abstract/document/9813702/authors#authors
Touloupou, M., Christodoulou, K., Inglezakis, A., Iosif, E., Themistocleous, M.: Benchmarking blockchains: the case of XRP ledger and beyond. In: Proceedings of the Fifty-third Annual Hawaii International Conference on System Sciences, (HICSS 55), 4–7 January 2022, Maui, Hawaii, USA. IEEE Computer Society, Los Alamitos (2022). https://scholarspace.manoa.hawaii.edu/bitstream/10125/80070/0586.pdf
Voudouris, A., Politis, I., Xenakis, C.: Secret sharing a key in a distributed way, Lagrange vs Newton. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1–7 (2022)
Zhou, X.: Threshold cryptosystem based fair online e-cash. In: 2008 Second International Symposium on Intelligent Information Technology Application, vol. 3, pp. 692–696. IEEE (2008)
Christodoulou, K, Iosif, E., Inglezakis, A., Themistocleous, M.: Consensus crash testing: exploring ripple’s decentralization degree in adversarial environments. Future Internet 12(3), 53 (2020). https://www.mdpi.com/1999-5903/12/3/53/htm
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kalai, R., Neji, W., Ben Rajeb, N. (2024). Reviewing the Role of Secret Sharing Schemes in Electronic Payment Protocols. In: Papadaki, M., Themistocleous, M., Al Marri, K., Al Zarouni, M. (eds) Information Systems. EMCIS 2023. Lecture Notes in Business Information Processing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-031-56478-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-56478-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-56477-2
Online ISBN: 978-3-031-56478-9
eBook Packages: Computer ScienceComputer Science (R0)