Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014

Slides:



Advertisements
Similar presentations
Notes 6.6 Fundamental Theorem of Algebra
Advertisements

CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
General Results for Polynomial Equations
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Objectives Fundamental Theorem of Algebra 6-6
Great Theoretical Ideas in Computer Science.
9.9 The Fundamental Theorem of Algebra
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
The Rational Root Theorem.  Is a useful way to find your initial guess when you are trying to find the zeroes (roots) of the polynomial.  THIS IS JUST.
Great Theoretical Ideas in Computer Science.
1 Secret Sharing. 2 Suppose you and your friend accidentally discovered a map that you believe would lead you to an island full of treasure. You and your.
COMPLEX ZEROS: FUNDAMENTAL THEOREM OF ALGEBRA Why do we have to know imaginary numbers?
Secret Sharing Nisarg Raval Sep 24, Material is adapted from CS513 lecture notes.
Secret Sharing and Key Escrow Supplemental Information for Cryptology Class Lecture slides by Richard Newman.
1 © 2010 Pearson Education, Inc. All rights reserved © 2010 Pearson Education, Inc. All rights reserved Chapter 3 Polynomial and Rational Functions.
3.6 Complex Zereos. The Fundamental Theorem of Algebra The Fundamental Theorem of Algebra says that every polynomial with complex coefficients must have.
Holt McDougal Algebra Fundamental Theorem of Algebra Use the Fundamental Theorem of Algebra and its corollary to write a polynomial equation of least.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Every polynomial P(x) of degree n>0 has at least one zero in the complex number system. N Zeros Theorem Every polynomial P(x) of degree n>0 can be expressed.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
Cryptographic Protocols Secret sharing, Threshold Security
Fundamental Theorem of Algebra
Outline Primitive Element Theorem Diffie Hellman Key Distribution
College Algebra Chapter 3 Polynomial and Rational Functions
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Previous lecture – smart-cards
Cryptography Why Cryptography Symmetric Encryption
Factoring Sums and Differences
3.4 Zeros of Polynomial Functions
Section 6.6 The Fundamental Theorem of Algebra
Advanced Computer Networks
Advanced Protocols.
Warm-up Multiply the factors and write in standard form.
Rational Root and Complex Conjugates Theorem
Lesson 7.2: Finding Complex Solutions of Polynomial Equations
Created by Mr. Lafferty Maths Dept.
3.8 Complex Zeros; Fundamental Theorem of Algebra
7.5 Zeros of Polynomial Functions
Key agreement in wireless sensor network
Secret Sharing (or, more accurately, “Secret Splitting”)
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptography CS 555 Lecture 22
The Fundamental Theorem of Algebra
5.7 Apply the Fundamental Theorem of Algebra
Finding Zeros of Polynomials
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems Omer Barkol Yuval Ishai Technion.
Polynomials, Secret Sharing, And Error-Correcting Codes
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Digital Certificates and X.509
Polynomials, Secret Sharing, And Error-Correcting Codes
Fundamental Theorem of Algebra
Lesson: _____ Section 2.5 The Fundamental Theorem of Algebra
Protocol ap1.0: Alice says “I am Alice”
Secret Sharing Schemes using Visual Cryptography
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Threshold RSA Cryptography
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Fundamental Theorem of Algebra
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptology Design Fundamentals
College Algebra Chapter 3 Polynomial and Rational Functions
6-8 Roots and Zeros Given a polynomial function f(x), the following are all equivalent: c is a zero of the polynomial function f(x). x – c is a factor.
(1) Find all of the zeros of f.
Security: Integrity, Authentication, Non-repudiation
Security: Public Key Cryptography
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptographic Protocols Secret Sharing, Threshold Security
Presentation transcript:

Secret Sharing CPS 290 - Computer Security Nisarg Raval Sep 24, 2014 Material is adapted from CS513 lecture notes (Cornell) http://www.cs.cornell.edu/courses/cs513/2000sp/SecretSharing.html

Why share a secret? http://s3.amazonaws.com/rapgenius/1604757_1306648362304.08res_250_319.jpg

Goal Given a secret s and n parties All n parties together recover s Less than n parties can not recover s

Naive Scheme S=10011 S1 = 100 S2 = 11 High Order Low Order Concatenate shares to reveal secret - S = (S1)(S2) = (100)(11) = 10011 What is the problem? - Think of a salary or password https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

No Partial Disclosure Given a secret s and n parties All n parties together recover s Less than n can not recover any information about s

Generate Shares using XOR S1 = Rand S2 = S XOR S1 10100 00111 10011 S = S1 XOR S2 https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares Security Check Can n parties generate s?

General Scheme Given a secret s and n parties Generate n-1 random strings as first n-1 shares Last share is the bitwise XORing of s with all the other n-1 shares Security Check Can n parties generate s? Can any n-1 parties generate s?

A More Flexible Scenario https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

A More Flexible Scenario ? S can be constructed by 2 or more generals Less than 2 generals can not construct s https://c2.staticflickr.com/8/7158/6761951167_54f2d69fb6_z.jpg

(n,t) Secret Sharing Given a secret s and n parties Any t or more parties can recover s Less than t parties have no information about s (3,2) secret sharing S=10011 S1 S2 S3 S

(n,2) Secret Sharing y (0,S) x

(n,2) Secret Sharing (xn-1,yn-1) (xn,yn) (x1,y1) y (x2,y2) (0,S) x

(n,2) Secret Sharing y Shares x (xn-1,yn-1) (xn,yn) (x1,y1) (x2,y2)

(n,2) Secret Sharing (xn-1,yn-1) (x1,y1) y (0,S) x

(n,2) Secret Sharing Exist a line for every S (x1,y1) y (0,S) x

(n,3) Secret Sharing (0,S) (x1,y1) (x2,y2) (xn-1,yn-1) (xn,yn)

Shamir’s Secret Sharing It takes t points to define a polynomial of degree t-1 Easy to prove corollary of the Fundamental Theorem of Algebra – a polynomial of degree n has exactly n roots (when counted with multiplicity) Suppose two distinct degree-(t-1) polynomials p1(x) and p2(x) both pass through the same set of t points. Then p1(x)-p2(x) has t roots, which is absurd. Create a (t-1)-degree polynomial with secret as the first coefficient and the remaining coefficient picked at random Find n points on the curve and give one to each of the parties. At least t points are required to fit the polynomial and hence to recover secret y = at-1 * xt-1 + at-2 * xt-2 + … + a1 * x + a0 Shamir, Adi (1979), "How to share a secret", Communications of the ACM

Use Case S1 (3,2) Secret Sharing Scheme S2 S3 Private Key

Problem? S1 compromised S1 S2 compromised S2 S1 + S2 = Secret S3 Time

Refresh Shares S’’1 S’’3 S’’2 S’1 S’3 S’2 S1 S2 S3 Time Trusted Third Party S’’1 S’’3 S’’2 S’1 S’3 S’2 S1 S2 S3 Time

Refresh Shares S’1 S’’1 S1 S’2 S’’2 S2 S’3 S’’3 can not Trusted Third Party S’1 S’’1 S1 S1 compromised S’2 S’’2 S2 S’2 compromised S’3 S’’3 can not construct secret S3 Time

Proactive Secret Sharing Server 1 Server 2 S1 S2 Goal: without changing the secret, periodically update shares in a way that old shares are invalidated.

Proactive Secret Sharing Server 1 Server 2 S1 S2 S11 S12 S21 S22 Goal: without changing the secret, periodically update shares in a way that old shares are invalidated.

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12 Goal: without changing the secret, periodically update shares in a way that old shares are invalidated.

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12 S’2 S’1 Goal: without changing the secret, periodically update shares in a way that old shares are invalidated.

Proactive Secret Sharing Server 1 Server 2 S1 S2 Exchange Partial Shares S11 S12 S21 S22 S21 S12 S’2 S’1 Recover S (S11 + S21) + (S12 + S22) S

BitCoin Multi-Signature Addresses Related to, but different than secret sharing. Secret sharing: break a single secret into multiple shares. Multi-signature address: requires multiple signatures with different private keys (secrets) to authorize a transaction. Examples: 2 out of 2, 2 out of 3, 3 out of 5.

Opening the Vault

Summary Useful technique to distribute secret Confidentiality Reliability Each share must be as long as the secret itself Require random bits of length proportional to the number of parties as well as length of the secret