Secret Sharing Algorithms

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Visual Cryptography Moni Naor Adi Shamir Presented By:
Ch2 Data Preprocessing part3 Dr. Bernard Chen Ph.D. University of Central Arkansas Fall 2009.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Introduction to Modern Cryptography, Lecture 11 1) More about efficient computation: Montgomery arithmetic, efficient exponentiation 2)Secret Sharing schemes.
Ch12. Secret Sharing Schemes
Factoring Polynomials
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Automated private key recovery for DNSSEC Colorado State University, CS 681 John Tesch.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
ON MULTIVARIATE POLYNOMIAL INTERPOLATION
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Descartes’s Rule of Signs & Bounds: Things that make your life easier TS: Making decisions after reflection and review.
Codes, Ciphers, and Cryptography-RSA Encryption
The RSA Algorithm Rocky K. C. Chang, March
Secure Content Delivery in Information- Centric Networks: Design, Implementation, and Analysis Satysjayant Misra, Reza Tourani, Nahid Ebrahimi Majd Presenter.
Factoring Polynomials
Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions.
Click to edit Master title style Fall, Privacy&Security - Virginia Tech – Computer Science Cryptographic Security Secret Sharing, Vanishing Data.
Discrete Mathematical Structures (Counting Principles)
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Cryptographic Security Secret Sharing, Vanishing Data 1Dennis Kafura – CS5204 – Operating Systems.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Polynomial Interpolation Lagrange Interpolation. Interpolation An Interpolating Function for a set of data: {( x 1, y 1 ),( x 2, y 2 ),( x 3, y 3 )…(
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Great Theoretical Ideas in Computer Science.
3.3 Polynomial and Synthetic Division. Long Division: Let’s Recall.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
Definition of Limit, Properties of Limits Section 2.1a.
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Secret Sharing Schemes In cryptography, secret sharing schemes refers to any method for distributing a secret among a group of participants, each of which.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptographic Protocols Secret sharing, Threshold Security
Warm Up Compute the following by using long division.
Ch12. Secret Sharing Schemes
Advanced Protocols.
Cryptography CS 555 Lecture 22
Operations on Polynomials
Polynomials, Secret Sharing, And Error-Correcting Codes
Polynomials, Secret Sharing, And Error-Correcting Codes
Secret Sharing Schemes using Visual Cryptography
POLYNOMIAL INTERPOLATION
Secret Sharing and Applications
Composition OF Functions.
Composition OF Functions.
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
A Secret Enriched Visual Cryptography
2.5 The Real Zeros of a Polynomial Function
A Novel Secret Sharing Scheme from Audio Perspective
Some New Issues on Secret Sharing Schemes
Cryptology Design Fundamentals
Secret Image Sharing Based on Encrypted Pixels
Cryptographic Protocols Secret Sharing, Threshold Security
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

Secret Sharing Algorithms

What is secret sharing? In cryptography, secret sharing refers to a method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their own.

Why do we need secret sharing? Gives tight control and removes single point vulnerability. Individual key share holder cannot change/access the data.

Mathematical Definition Goal is to divide some data D (e.g., the safe combination) into n pieces D1,D2….Dn in such a way that: Knowledge of any k or more D pieces makes D easily computable. Knowledge of any k -1 or fewer pieces leaves D completely undetermined (in the sense that all its possible values are equally likely). This scheme is called (k,n) threshold scheme. If k=n then all participants are required together to reconstruct the secret.

Shamir's Secret Sharing Suppose we want to use (k,n) threshold scheme to share our secret S where k < n. Choose at random (k-1) coefficients a1,a2,a3…ak-1 , and let S be the a0

Shamir's Secret Sharing Construct n points (i,f(i)) where i=1,2…..n Given any subset of k of these pairs, we can find the coefficients of the polynomial by interpolation, and then evaluate a0=S , which is the secret.

Example Let S=1234 n=6 and k=3 and obtain random integers a1=166 and a2=94 Secret share points (1,1494),(2,1942)(3,2598)(4,3402)(5,4414)(6,5614) We give each participant a different single point (both x and f(x) ).

Reconstruction In order to reconstruct the secret any 3 points will be enough Let us consider