Secret Sharing and Applications

Slides:



Advertisements
Similar presentations
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Advertisements

Ch12. Secret Sharing Schemes
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
1 Intro To Encryption Exercise Problem Alice and Bob wish to play the game Paper, Rock and Scissors. What may be the problems with the game? The.
Secret Sharing Algorithms
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Great Theoretical Ideas in Computer Science.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Secret Sharing and Key Escrow Supplemental Information for Cryptology Class Lecture slides by Richard Newman.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Multi-Party Computation r n parties: P 1,…,P n  P i has input s i  Parties want to compute f(s 1,…,s n ) together  P i doesn’t want any information.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Overview Modern public-key cryptosystems: RSA
Cryptographic Protocols Secret sharing, Threshold Security
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Public Key Encryption.
Advanced Computer Networks
CS580 Internet Security Protocols
Previous lecture – smart-cards
Ch12. Secret Sharing Schemes
B. R. Chandavarkar CSE Dept., NITK Surathkal
Advanced Protocols.
A Novel Group Key Transfer Protocol
Elliptic Curves.
Secret Sharing (or, more accurately, “Secret Splitting”)
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
9.2 SECURE CHANNELS Medisetty Swathy.
Fuzzy Identity Based Encryption
CS/ECE 478 Introduction to Network Security
Celia Li Computer Science and Engineering York University
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Membership Andrew Moore 9/27/2011.
Polynomials, Secret Sharing, And Error-Correcting Codes
Quantum Cryptography Scott Roberts CSE /01/2001.
Secret Sharing Schemes using Visual Cryptography
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Threshold RSA Cryptography
Key Management Network Systems Security
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Where Complexity Finally Comes In Handy…
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Cryptology Design Fundamentals
Where Complexity Finally Comes In Handy…
Introduction to Cryptography
Secret Image Sharing Based on Encrypted Pixels
Cryptographic Protocols Secret Sharing, Threshold Security
The RSA Public-Key Encryption Algorithm
Secure Diffie-Hellman Algorithm
Where Complexity Finally Comes In Handy…
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Secret Sharing and Applications

Secret Sharing- Threshold Scheme The safety of all keys stored in the system- and the entire system-may depend on a single master key. This has two serious drawbacks. First, if the master key is accidentally or maliciously exposed, the entire system is vulnerable. Second, if the master key is lost or destroyed, all information in the system becomes inaccessible. The latter problem can be solved by giving copies of the key to “trustworthy” users. But in so doing, the system becomes vulnerable to betrayal.

Secret Sharing- Threshold Scheme The solution is to break a key k into n shadows ( pieces) k1,……..kn in such a way that: 1. With knowledge of any t of the ki, computing k is easy; and 2. With knowledge of any t-1 or fewer of the ki,determining k is impossible because of lack information. The n shadows are given to n users. Because t shadows are required to reconstruct the key, exposure of a shadow does not endanger the key, and no group of less than t of the users can conspire to get the key. At the same time, if a shadow is lost or destroyed, key recovery is still possible. Such schemes are called (t , n ) threshold schemes.

Two Extreme Cases (1, n) threshold scheme can be constructed by duplicating the same key k to all users. (n , n) threshold scheme can be constructed by randomly selecting k1, k2,……….,kn-1, and determining kn=k  k1  k2 ………. kn-1.

Secret Sharing based on the Lagrange Interpolating Polynomial Shamir has proposed a scheme based on the Lagrange interpolating polynomial. The shadows are derived from a random polynomial of degree t-1: with constant term a0=k . All arithmetic is done in the Galois field GF(p), where p is a prime number larger than both k and n. Given h(x), the key k is easily compute by k=h(0). The n shadows are computed by evaluating h(x) at n distinct values x1,……….., xn : ki=h(xi) i= 1,2,……….,n.

Secret Sharing based on the Lagrange Interpolating Polynomial Given t shadows ki1,………,ki t, h(x)is reconstructed from the Lagrange Interpolating polynomial:

Secret Sharing based on the Lagrange Interpolating Polynomial Example: Let t=3, n=5, p=17, k=13, and h(x)=(2x²+10x+13) mod 17 with random coefficients 2 and 10. Evaluating h(x) at x=1,2…,5 , we get five shadows: k1=h(1)=(2+10+13)mod 17=8 k2=h(2)=(8+20+13)mod 17=7 k3=h(3)=(18+30+13)mod 17=10 k4=h(4)=(32+40+13)mod 17=0 k5=h(5)=(50+50+13)mod 17=11 we can reconstruct h(x) from any three of the shadows. Using k1,k3,and k5 we have:

Secret Sharing based on the Lagrange Interpolating Polynomial (continue)

Secret Sharing Without the Assistance of a Mutually Trusted Party In case no trusted dealer is available, how to establish a secret sharing scheme? Example: Four users A, B, C and D need to set up a (2, 4) secret sharing without the assistance of a mutually trusted party. Each user selects a private key, ki, for i= A, B, C, D. Then secretly enters the private key one by one, and the system key is determined by k=kAkBkCkD.

Secret Sharing Without the Assistance of a Mutually Trusted Party Then each user becomes the dealer and computes shares for other users using (2, 3) threshold scheme. Thus, they have users keys A B C D kA kA,B kA,C kA,D shares kB kB,A kB,C kB,D based on kC kC,A kC,B kC,D (2, 3) kD kD,A kD,B kD,C threshold scheme

Secret Sharing Without the Assistance of a Mutually Trusted Party Later, for example, when A, B work together, they know kA, kB . In addition, from kC,A and kC,B, they can reconstruct kC. Similarly, from kD,A and kD,B , they can reconstruct kD. “Secret” can be either encryption key, like DES key, or private key, like DSS private key. If it is a DES key, then each share can only be used once. Efficiency is very low. If it is a DSS signing key, then due to the mathematical structure of public-key algorithm, each share does not need to be revealed directly.