SlideShare a Scribd company logo
1 of 15
Download to read offline
How to share a secret
           by Adi Shamir

           Damitha Premadasa.
            Kelum Senanayake.
Introduction
   About author Adi Shamir
       An Israeli cryptographer born July 6, 1952.
       He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir
        Identification Scheme.
       One of the inventors of Differential Cryptanalys.
       Has made numerous contributions to the fields of
        cryptography and computer science.
   We rely on secrets such as safe combinations, PIN codes,
    computer passwords, etc.
       Secrets can be lost.
       Documents get destroyed, Hard disks fail,
       People forget, People leave companies, People die...
Example key management scenario
   Eleven scientists are working on a secret project. They
    wish to lock up the documents in a cabinet. The cabinet
    can be opened if and only if six or more of the scientists
    are present.
       What is the smallest number of locks needed?
       What is the smallest number of keys to the locks each scientist
        must carry?
   Minimal solution uses 462 locks and 252 keys per
    scientist.
   Drawbacks:
       These numbers are clearly impractical
       Becomes exponentially worse when the number of scientists
        increases
Key management/cryptographic
schemes
   What is a Key management system.
       Key management is the provisions made in
        a cryptography system design that are related to generation,
        exchange, storage, safeguarding, use, vetting, and replacement
        of keys.
   Properties of key management schemes
       Safety
       Convenience
Shamir's secret-sharing scheme
   Why Threshold schemes?
   Secret sharing scheme,
       Divide secret data (D) in to pieces (n)
       Knowledge of some pieces (k) enables to derive secret data
        (D)
       Knowledge of any pieces (k-1) makes secret data (D)
        completely undetermined.
   Such a scheme is called a (k, n) threshold scheme.
   Easily computable when have necessary data available
   Avoid single point of failure, increase reliability and
    security
   Safety and convenience
Shamir's secret-sharing scheme (A simple
(k, n) threshold scheme)

   Suppose using ( k, n ) threshold scheme to share our
    secret S.
   Choose at random k-1 coefficients a1, a2,.., a(k-1)
    and let a0=S. Build the polynomial.

   q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)

   Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).
   Given any subset of k pairs, can find S using interpolation
   The secret is the constant term a0.
Shamir's Secret Sharing scheme
   The essential idea of Adi Shamir's threshold scheme,
       2 points are sufficient to define a line.
       3 points are sufficient to define a parabola.
       4 points to define a cubic curve and so forth.
       k points to define a polynomial of degree (k - 1)
Example
   S = 1234, n = 6, k = 3
   At random we obtain 2 numbers: a1 = 166, a2 = 94.
   Our polynomial to produce secret shares (points) is
    therefore:
   q(x) = 1234 + 166 x + 94x2
   We construct 6 points from the polynomial:
   (1,1494); (2,1942); (3,2578); (4,3402);
    (5,4414); (6,5614)
   We give each participant a different single point (both x
    and q(x) ).
Example contd…
   Reconstruction the secret,
   In order to reconstruct the secret any 3 points will be
    enough.
   Let us consider (2,1942); (4,3402); (5,4414);
   Using Lagrange basis polynomials, it is possible to
    construct q(x) hence S value can be derived.
Example contd…
Let us consider



We will compute Lagrange basis polynomials:
Example contd…
Therefore,
Useful properties of (k, n) threshold
scheme
   Secure.
   Minimal: The size of each piece does not exceed the size
    of the original data.
   Extensible: When k is kept fixed, Di pieces can be
    dynamically added or deleted without affecting the other
    pieces.
   Dynamic: Security can be easily enhanced without
    changing the secret, but by changing the polynomial
    occasionally (keeping the same free term) and
    constructing new shares to the participants.
Useful properties contd..
   Flexible: In organizations where hierarchy is important,
    we can supply each participant different number of pieces
    according to his importance inside the organization. For
    instance, the president can unlock the safe alone, whereas
    3 secretaries are required together to unlock it.
   Efficient algorithms [O(n log2 n)] available for polynomial
    evaluation and interpolation
Available Implementations
   http://sourceforge.net/projects/secretsharejava/
   http://www.christophedavid.org/w/c/w.php/Calculators/Sh
    amirSecretSharing
   http://point-at-infinity.org/ssss/demo.html
   http://www.buttsoft.com/software/tontine/
   http://www.buttsoft.com/software/tontine/java.html
Q&A


  Thank You

More Related Content

What's hot (20)

12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Diffiehellman
DiffiehellmanDiffiehellman
Diffiehellman
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
cryptography
cryptographycryptography
cryptography
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Viewers also liked

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemeswonloser
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmNikita Kasar
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionKelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesMax Lee
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESECUNS
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GCKelum Senanayake
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation trainingAIESECGreece
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionKelum Senanayake
 

Viewers also liked (14)

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
EP interview question list
EP interview question listEP interview question list
EP interview question list
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview Slides
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation training
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 

Similar to How to Share a Secret (20)

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
15
1515
15
 
15
1515
15
 
11
1111
11
 
11
1111
11
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Kleptography
KleptographyKleptography
Kleptography
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research Paper
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

How to Share a Secret

  • 1. How to share a secret by Adi Shamir Damitha Premadasa. Kelum Senanayake.
  • 2. Introduction  About author Adi Shamir  An Israeli cryptographer born July 6, 1952.  He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir Identification Scheme.  One of the inventors of Differential Cryptanalys.  Has made numerous contributions to the fields of cryptography and computer science.  We rely on secrets such as safe combinations, PIN codes, computer passwords, etc.  Secrets can be lost.  Documents get destroyed, Hard disks fail,  People forget, People leave companies, People die...
  • 3. Example key management scenario  Eleven scientists are working on a secret project. They wish to lock up the documents in a cabinet. The cabinet can be opened if and only if six or more of the scientists are present.  What is the smallest number of locks needed?  What is the smallest number of keys to the locks each scientist must carry?  Minimal solution uses 462 locks and 252 keys per scientist.  Drawbacks:  These numbers are clearly impractical  Becomes exponentially worse when the number of scientists increases
  • 4. Key management/cryptographic schemes  What is a Key management system.  Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys.  Properties of key management schemes  Safety  Convenience
  • 5. Shamir's secret-sharing scheme  Why Threshold schemes?  Secret sharing scheme,  Divide secret data (D) in to pieces (n)  Knowledge of some pieces (k) enables to derive secret data (D)  Knowledge of any pieces (k-1) makes secret data (D) completely undetermined.  Such a scheme is called a (k, n) threshold scheme.  Easily computable when have necessary data available  Avoid single point of failure, increase reliability and security  Safety and convenience
  • 6. Shamir's secret-sharing scheme (A simple (k, n) threshold scheme)  Suppose using ( k, n ) threshold scheme to share our secret S.  Choose at random k-1 coefficients a1, a2,.., a(k-1) and let a0=S. Build the polynomial.  q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)  Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).  Given any subset of k pairs, can find S using interpolation  The secret is the constant term a0.
  • 7. Shamir's Secret Sharing scheme  The essential idea of Adi Shamir's threshold scheme,  2 points are sufficient to define a line.  3 points are sufficient to define a parabola.  4 points to define a cubic curve and so forth.  k points to define a polynomial of degree (k - 1)
  • 8. Example  S = 1234, n = 6, k = 3  At random we obtain 2 numbers: a1 = 166, a2 = 94.  Our polynomial to produce secret shares (points) is therefore:  q(x) = 1234 + 166 x + 94x2  We construct 6 points from the polynomial:  (1,1494); (2,1942); (3,2578); (4,3402); (5,4414); (6,5614)  We give each participant a different single point (both x and q(x) ).
  • 9. Example contd…  Reconstruction the secret,  In order to reconstruct the secret any 3 points will be enough.  Let us consider (2,1942); (4,3402); (5,4414);  Using Lagrange basis polynomials, it is possible to construct q(x) hence S value can be derived.
  • 10. Example contd… Let us consider We will compute Lagrange basis polynomials:
  • 12. Useful properties of (k, n) threshold scheme  Secure.  Minimal: The size of each piece does not exceed the size of the original data.  Extensible: When k is kept fixed, Di pieces can be dynamically added or deleted without affecting the other pieces.  Dynamic: Security can be easily enhanced without changing the secret, but by changing the polynomial occasionally (keeping the same free term) and constructing new shares to the participants.
  • 13. Useful properties contd..  Flexible: In organizations where hierarchy is important, we can supply each participant different number of pieces according to his importance inside the organization. For instance, the president can unlock the safe alone, whereas 3 secretaries are required together to unlock it.  Efficient algorithms [O(n log2 n)] available for polynomial evaluation and interpolation
  • 14. Available Implementations  http://sourceforge.net/projects/secretsharejava/  http://www.christophedavid.org/w/c/w.php/Calculators/Sh amirSecretSharing  http://point-at-infinity.org/ssss/demo.html  http://www.buttsoft.com/software/tontine/  http://www.buttsoft.com/software/tontine/java.html
  • 15. Q&A Thank You