28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.

Slides:



Advertisements
Similar presentations
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
Advertisements

How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Ch12. Secret Sharing Schemes
Primality Testing By Ho, Ching Hei Cheung, Wai Kwok.
hap8.html#chap8ex5.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
7. Asymmetric encryption-
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Announcements: SHA due tomorrow SHA due tomorrow Last exam Thursday Last exam Thursday Available for project questions this week Available for project.
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
Dr. Lo’ai Tawalbeh Summer 2007 Chapter 9 – Public Key Cryptography and RSA Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus INCS.
Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim.
Public Key Crytography1 From: Introduction to Algorithms Cormen, Leiserson and Rivest.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
Cryptography Lecture 11: Oct 12. Cryptography AliceBob Cryptography is the study of methods for sending and receiving secret messages. adversary Goal:
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Secret Sharing Algorithms
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
© Copyright Martin Tompa, 1999 Secret Codes, Unforgeable Signatures, and Coin Flipping on the Phone Martin Tompa Computer Science & Engineering University.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Introduction to Public Key Cryptography
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
8. Data Integrity Techniques
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
The RSA Algorithm Rocky K. C. Chang, March
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Aggregation in Sensor Networks
Announcements: SHA due Tuesday SHA due Tuesday Last exam Thursday Last exam Thursday Available for project questions this week Available for project questions.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Secure Computation (Lecture 7-8) Arpita Patra. Recap >> (n,t)-Secret Sharing (Sharing/Reconstruction) > Shamir Sharing > Lagrange’s Interpolation for.
Threshold PKC Shafi Goldwasser and Ran Canetti. Public Key Encryption [DH] A PKC consists of 3 PPT algorithms (G,E,D) - G(1 k ) outputs public key e,
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public-Key Encryption
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
1 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Computer Science Division
Great Theoretical Ideas in Computer Science.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Secret Sharing Nisarg Raval Sep 24, Material is adapted from CS513 lecture notes.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
Primality Testing. Introduction The primality test provides the probability of whether or not a large number is prime. Several theorems including Fermat’s.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Secret Sharing Schemes In cryptography, secret sharing schemes refers to any method for distributing a secret among a group of participants, each of which.
Cryptographic Protocols Secret sharing, Threshold Security
Introduction to Information Technologies
Ch12. Secret Sharing Schemes
Advanced Protocols.
Polynomials, Secret Sharing, And Error-Correcting Codes
Introduction to Information Technologies
Polynomials, Secret Sharing, And Error-Correcting Codes
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Threshold RSA Cryptography
Secret Sharing and Applications
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
Cryptology Design Fundamentals
Cryptographic Protocols Secret Sharing, Threshold Security
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University

2 What is it? a method of distributing a secret amongst a group of people by giving each person a share (or shadow) of the secret Schemes  Splitting  Threshold

3 Splitting split a secret amongst people such that all people are needed to reconstruct the secret choose random numbers, and give them to of the people and give xxxx to the remaining person special case of...

4 Threshold split a secret into pieces such that any group of people can reconstruct the secret, but a group of less than people cannot called a threshold scheme

5 Why do we want ? security vs. reliability  why not keep the key in one very safe place?  why not have multiples copies? safety vs. convenience  copies are convenient but easier to misuse  requiring all parties is inconvenient

6 Combinatorial Approach need locks each of the people need keys secret still exists in one place... very impractical!

7 Shamir Approach invented by Adi Shamir in 1979 based on points uniquely determining a polynomial of degree we divide our secret into pieces by picking a random degree polynomial xxxxxxxxxxxx in which xxxx, and

8 Shamir Approach (continued) represent each share as a point all arithmetic done modulo a prime number x that is greater than both and - why? coefficients of are randomly chosen from a uniform distribution over the integers in

9 Shamir Approach (continued) uses Lagrange Interpolation

10 Example 1: even with a single share (point), the secret can still be any value in with equal probability

11 Example 2: threshold scheme give each of the people a share

12 Example 2 (continued) suppose people with shares,, and decide to reconstruct the secret

13 Remarks using requires adversaries to acquire more than shares Claude Shannon would be space-efficient shares (same size as secret)

14 Remarks (continued) add or delete shares without affecting others easy to create new shares without changing secret easy to create hierarchical schemes can be used for secrets of secrets

15 Blakley Approach invented by George Blakley in 1979 based on any -dimensional hyperplanes intersecting at one point each share defines a hyperplane secret is the point of intersection of any hyperplanes

16 Example 1: the secret is at the intersection of of the x -dimensional hyperplanes

17 Example 2: the secret is at the intersection of of the x -dimensional hyperplanes what about out of shares?

18 Remarks Claude Shannon would be less space-efficient shares ( times the size of secret)

19 Other uses Verifiable Secret Sharing  allows the people to be certain up to some iprobability of error that no other people are ilying about the value of their shares Visual Secret Sharing  each share is a transparency and can be icombined without computation to obtain secret

20 References Shamir, A. How to Share a Secret. Comm. ACM 22, 11 (Nov. 1979), Trappe, W., and Washington, L. Introduction to Cryptography with Coding Theory. Prentice Hall, Upper Saddle River, NJ, Weisstein, E. “Lagrange Interpolating Polynomial.” From MathWorld-A Wolfram Web Resource. “What are some secret sharing schemes.” RSA Security. Wikipedia. (2004). Secret Sharing ( Retrieved Sept. 22, All text is available under the terms of the GNU Free Documentation LicenseGNU Free Documentation License