Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014

Slides:



Advertisements
Similar presentations
MPC for Comparing Two Shared Secrets without Bit-Decomposition Takashi Nishide * Kazuo Ohta The University of Electro-Communications * Hitachi Software.
Advertisements

1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Apr 30, 2002Mårten Trolin1 Previous lecture – passwords Passwords for authentication –Storing hashed passwords –Use of salt Passwords for key generation.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Efficient Proactive Security for Sensitive Data Storage Arun Subbiah Douglas M. Blough School of ECE, Georgia Tech {arun,
Secure Cloud Database using Multiparty Computation.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
1 Secret Sharing. 2 Suppose you and your friend accidentally discovered a map that you believe would lead you to an island full of treasure. You and your.
Secret Sharing Nisarg Raval Sep 24, Material is adapted from CS513 lecture notes.
Secret Sharing and Key Escrow Supplemental Information for Cryptology Class Lecture slides by Richard Newman.
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Secret Sharing Schemes In cryptography, secret sharing schemes refers to any method for distributing a secret among a group of participants, each of which.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Cryptographic Protocols Secret sharing, Threshold Security
Public Key Cryptography
Public Key Encryption.
Advanced Information Security 5 ECC Cryptography
Advanced Computer Networks
Cryptography Dr. X.
CS580 Internet Security Protocols
Previous lecture – smart-cards
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Privacy & Security.
Factoring Sums and Differences
Identity Based Encryption
Public Key Encryption and Digital Signatures
Notes Over 3.4 The Rational Zero Test
Advanced Computer Networks
Advanced Protocols.
Some slides borrowed from Philippe Golle, Markus Jacobson
A Novel Group Key Transfer Protocol
Public Key Encryption and the RSA Algorithm
Introduction to Security
Key agreement in wireless sensor network
Secret Sharing (or, more accurately, “Secret Splitting”)
Human Computable Passwords
Cryptography CS 555 Lecture 22
Cryptographic Protocols (Secret Splitting)
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Fuzzy Identity Based Encryption
Digital Certificates and X.509
Secret Sharing Schemes using Visual Cryptography
Threshold RSA Cryptography
Secret Sharing and Applications
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Cryptology Design Fundamentals
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security: Integrity, Authentication, Non-repudiation
Secret Image Sharing Based on Encrypted Pixels
Security: Public Key Cryptography
Cryptographic Protocols Secret Sharing, Threshold Security
Key Exchange, Man-in-the-Middle Attack
Simple Hash Functions Network Security.
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Cheating and Prevention in Visual Secret Sharing
Empirical Distributions
Presentation transcript:

Secret Sharing CPS 290 - Computer Security Nisarg Raval Sep 24, 2014 Material is adapted from CS513 lecture notes (Cornell) http://www.cs.cornell.edu/courses/cs513/2000sp/SecretSharing.html

Why share a secret? http://s3.amazonaws.com/rapgenius/1604757_1306648362304.08res_250_319.jpg

Goal Given a secret s and n parties All n parties together recover s Less than n parties can not recover s

Naive Scheme S=10011 S1 = 100 S2 = 11 High Order Low Order Concat shares to reveal secret - S = (S1)(S2) = (100)(11) = 10011 What is the problem? - Think of a salary or password https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

Partial Disclosure Given a secret s and n parties All n parties together recover s Less than n can not recover any information about s

Generate Shares using XOR S1 = Rand S2 = S XOR S1 10100 00111 10011 S = S1 XOR S2 https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares Security Check Can n parties generate s?

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares Security Check Can n parties generate s? Can any n-1 parties generate s?

Example S=10011 S1 S2 S3 S https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

Problem? S=10011 ? S1 S2 S3 S can be constructed by 2 or more generals Less than 2 generals can not construct s https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

(n,t) Secret Sharing Given a secret s and n parties Any t or more parties can recover s Less than t parties have not information about s (3,2) secret sharing S=10011 S1 S2 S3 S

(n,2) Secret Sharing y (0,S) x

(n,2) Secret Sharing (xn-1,yn-1) (xn,yn) (x1,y1) y (x2,y2) (0,S) x

(n,2) Secret Sharing y Shares x (xn-1,yn-1) (xn,yn) (x1,y1) (x2,y2)

(n,2) Secret Sharing (xn-1,yn-1) (x1,y1) y (0,S) x

(n,2) Secret Sharing Exist a line for every S (x1,y1) y (0,S) x

(n,3) Secret Sharing (0,S) (x1,y1) (x2,y2) (xn-1,yn-1) (xn,yn)

Shamir’s Secret Sharing It takes t points to define a polynomial of degree t-1 Create a t-1 degree polynomial with secret as the first coefficient and the remaining coefficient picked at random Find n points on the curve and give one to each of the parties. At least t points are required to fit the polynomial and hence to recover secret y = at-1 * xt-1 + at-2 * xt-2 + … + a1 * x + a0 Shamir, Adi (1979), "How to share a secret", Communications of the ACM

Use Case S1 (3,2) Secret Sharing Scheme S2 S3 Private Key

Problem? S1 S1 compromised S2 compromised S2 S1 + S2 = Secret S3 Time

Refresh Shares S’’1 S’’3 S’’2 S’1 S’3 S’2 S1 S2 S3 Time Trusted Third Party S’’1 S’’3 S’’2 S’1 S’3 S’2 S1 S2 S3 Time

Refresh Shares S’1 S’’1 S1 S’2 S’’2 S2 S’3 S’’3 can not Trusted Third Party S’1 S’’1 S1 S1 compromised S’2 S’’2 S2 S’2 compromised S’3 S’’3 can not construct secret S3 Time

Proactive Secret Sharing Server 1 Server 2 S1 S2

Proactive Secret Sharing Server 1 Server 2 S1 S2 S11 S12 S21 S22

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12 S’2 S’1

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12 S’2 S’1 Recover S (S11 + S21) + (S12 + S22) S

Summary Useful technique to distribute secret Confidentiality Reliability Each share must be as long as the secret itself Require random bits of length proportional to the number of parties as well as length of the secret