Ch12. Secret Sharing Schemes

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Visual Cryptography Moni Naor Adi Shamir Presented By:
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Ch12. Secret Sharing Schemes
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
Secret Sharing Algorithms
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
Codes, Ciphers, and Cryptography-RSA Encryption
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Introduction to Cryptography
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Great Theoretical Ideas in Computer Science.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013,
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Cryptographic Protocols Secret sharing, Threshold Security
RSA cryptosystem with large key length
Public Key Cryptography
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Asymmetric-Key Cryptography
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
CS580 Internet Security Protocols
Public-key Cryptography
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security
Polynomials, Secret Sharing, And Error-Correcting Codes
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A Data Hiding Scheme Based Upon Block Truncation Coding
Symmetric-Key Cryptography
Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Membership Andrew Moore 9/27/2011.
Polynomials, Secret Sharing, And Error-Correcting Codes
Secret Sharing Schemes using Visual Cryptography
Digital Signatures…!.
Threshold RSA Cryptography
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Secret Sharing and Applications
Lecture 6: Digital Signature
Hash Functions Motivation Hash Functions: collision, pre-images SHA-1
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Introduction to Elliptic Curve Cryptography
Where Complexity Finally Comes In Handy…
A Secret Enriched Visual Cryptography
A Novel Secret Sharing Scheme from Audio Perspective
Some New Issues on Secret Sharing Schemes
One Way Functions Motivation Complexity Theory Review, Motivation
Cryptology Design Fundamentals
Symmetric-Key Cryptography
Sharing Technologies for Cloud Computing
Where Complexity Finally Comes In Handy…
Introduction to Algorithms Second Edition by
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Secret Image Sharing Based on Encrypted Pixels
Secret image sharing with steganography and authentication
Cryptographic Protocols Secret Sharing, Threshold Security
Where Complexity Finally Comes In Handy…
Cheating and Prevention in Visual Secret Sharing
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
A Quadratic-Residue-based Fragile Watermarking Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Ch12. Secret Sharing Schemes Imagine that you have made billions of £$ from Internet stocks, and you wish to leave your estate to your 4 children. You like to divide it among them in such a way that two of them have to get together to reconstruct the real combination, i.e., someone who wants some of the inheritance must somehow cooperate with one of the other children. (t,w)=(2,4) - threshold scheme

Definition Let t≦w be positive integers. A (t,w)-threshold scheme is a method of sharing a message M among a set of w participants such that any subset consisting of t participants can reconstruct the message M, but no subsets of smaller size can reconstruct M.

Shamir threshold scheme in 1979 Based on Lagrange interpolation polynomial Also called Lagrange interpolation scheme Choose a large prime p, the message M is represented as a number (mod p) s(x)≡M+s1x+s2x2+…+st-1xt-1 (mod p) (xi,yi), i=1,2, …, w; yi≡s(xi) (mod p)

Lagrange Interpolating Polynomials  

Computing Secret Value M

Simple Exercises from p.303-306 2. You set up a (2,30) Shamir threshold scheme, working mod the prime 101. Two of the shares are (1,13) and (3,12). Another person received the share (2,*), what is the value of *? 3. In a (3,5) Shamir secret sharing scheme with modulus p=17, the following were given to Alice, Bob, Charles: (1,8), (3,10), (5,11). Calculate the corresponding Lagrange interpolating polynomial, and identify the secret.

(Secret) Value Sharing A (k, n) threshold secret sharing should satisfy the following requirements: (1) A secret value M is used to generate n shadows. (2) Any ≧k shadows can reconstruct the secret value M. (3) Any <k shadows can not get sufficient information to reveal the secret value M.

s(x) ≡ M+s1x+s2x2+…+sk-1xk-1 (mod p) Secret Sharing (1/4) A (k, n) threshold polynomial can be written by s(x) ≡ M+s1x+s2x2+…+sk-1xk-1 (mod p) Select n distinct integers x1,x2,…,xn from [0,p-1] Deliver (xi,s(xi)) to the i-th participant p= a (large) prime number M: secret value s1,…,sk-1: randomly chosen from [0, p-1]

Secret Sharing (2/4) To reveal the secret value M, we must collect (at least k) ≧k shadows. Without loss of generality, we use (x1,s(x1)),…, (xk,s(xk)) as k shadows. We can reveal the secret value M by using Lagrange interpolation. where M=s(0)

Secret Sharing (3/4) Example: (k, n)=(2, 4)-threshold secret sharing Given x1=1,x2=2,x3=3,x4=4 A polynomial equation can be defined as s(x) ≡ 9+13x mod 17 Then s(1)=5, s(2)=1, s(3)=14, s(4)=10 Four shadows: (1,5), (2,1), (3,14), (4,10)

Secret Sharing (4/4) Example We can get the equation by taking (1,5), (4,10) by using Lagrange interpolation. s(0)=9

Secret Image Sharing A (k, n)-threshold secret image sharing msut satisfy the following requirements: (1)The secret image S is used to generate n shadow images. (2)Any ≧k shadow images can reconstruct the secret image. (3)Any <k shadow images can not get sufficient information to reveal the secret image.

Generation of Shadow Images Pre-operation

Scramble a Secret Image Pre-operation: All gray levels are in the range [0,255] Let p=251 Suppress all values larger than 250 to 250. -The values are in the range 0~250 -A Lossy method Select a key P to create a permutation matrix. -To decrease the correlation between any neighboring pixels.

Meaningless Shadow Images Share

Shadow Images Acquisition The equation can be written by g(x)≡a0+a1x+a2x2+…+ak-1xk-1 mod 251 Select n distinct secret keys x1,x2,…,xn. Deliver (xi,s(xi)) to the ith participant.

Get the Permutation Image

Secret Image Reconstruction Without loss of generality, we have (x1,s(x1)),(x2,s(x2)),…, (xk,s(xk)). Use Lagrange interpolation to reconstruct the image.

Flowchart of Recovery

An Example Without Permutation

Experimental results The (2,4)-threshold on image Lenna 512x512, Histogram of Lenna The secret image The permutation image (1,s(1)) (2,s(2)) (3,s(3)) (4,s(4))

Security Analysis Without loss of generality, if we only have (k-1) shadow images. y1 ≡ (a0+a1+…+ak-1) mod p y2 ≡ (a0+2a1+…+2k-1ak-1) mod p … yk-1 ≡ (a0+(k-1)a1+…+(k-1)(k-1)ak-1) mod p The probability to get the right image is

Property and Conclusion A lossy method The size of each shadow image is 1/r of the secret image Fault-tolerance Use network hard disks for storage. Steganography …

References W. Trappe and l.C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006) C.C. Thien and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, no. 1, 765-770, 2002.