SlideShare a Scribd company logo
1 of 15
Download to read offline
How to share a secret
           by Adi Shamir

           Damitha Premadasa.
            Kelum Senanayake.
Introduction
   About author Adi Shamir
       An Israeli cryptographer born July 6, 1952.
       He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir
        Identification Scheme.
       One of the inventors of Differential Cryptanalys.
       Has made numerous contributions to the fields of
        cryptography and computer science.
   We rely on secrets such as safe combinations, PIN codes,
    computer passwords, etc.
       Secrets can be lost.
       Documents get destroyed, Hard disks fail,
       People forget, People leave companies, People die...
Example key management scenario
   Eleven scientists are working on a secret project. They
    wish to lock up the documents in a cabinet. The cabinet
    can be opened if and only if six or more of the scientists
    are present.
       What is the smallest number of locks needed?
       What is the smallest number of keys to the locks each scientist
        must carry?
   Minimal solution uses 462 locks and 252 keys per
    scientist.
   Drawbacks:
       These numbers are clearly impractical
       Becomes exponentially worse when the number of scientists
        increases
Key management/cryptographic
schemes
   What is a Key management system.
       Key management is the provisions made in
        a cryptography system design that are related to generation,
        exchange, storage, safeguarding, use, vetting, and replacement
        of keys.
   Properties of key management schemes
       Safety
       Convenience
Shamir's secret-sharing scheme
   Why Threshold schemes?
   Secret sharing scheme,
       Divide secret data (D) in to pieces (n)
       Knowledge of some pieces (k) enables to derive secret data
        (D)
       Knowledge of any pieces (k-1) makes secret data (D)
        completely undetermined.
   Such a scheme is called a (k, n) threshold scheme.
   Easily computable when have necessary data available
   Avoid single point of failure, increase reliability and
    security
   Safety and convenience
Shamir's secret-sharing scheme (A simple
(k, n) threshold scheme)

   Suppose using ( k, n ) threshold scheme to share our
    secret S.
   Choose at random k-1 coefficients a1, a2,.., a(k-1)
    and let a0=S. Build the polynomial.

   q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)

   Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).
   Given any subset of k pairs, can find S using interpolation
   The secret is the constant term a0.
Shamir's Secret Sharing scheme
   The essential idea of Adi Shamir's threshold scheme,
       2 points are sufficient to define a line.
       3 points are sufficient to define a parabola.
       4 points to define a cubic curve and so forth.
       k points to define a polynomial of degree (k - 1)
Example
   S = 1234, n = 6, k = 3
   At random we obtain 2 numbers: a1 = 166, a2 = 94.
   Our polynomial to produce secret shares (points) is
    therefore:
   q(x) = 1234 + 166 x + 94x2
   We construct 6 points from the polynomial:
   (1,1494); (2,1942); (3,2578); (4,3402);
    (5,4414); (6,5614)
   We give each participant a different single point (both x
    and q(x) ).
Example contd…
   Reconstruction the secret,
   In order to reconstruct the secret any 3 points will be
    enough.
   Let us consider (2,1942); (4,3402); (5,4414);
   Using Lagrange basis polynomials, it is possible to
    construct q(x) hence S value can be derived.
Example contd…
Let us consider



We will compute Lagrange basis polynomials:
Example contd…
Therefore,
Useful properties of (k, n) threshold
scheme
   Secure.
   Minimal: The size of each piece does not exceed the size
    of the original data.
   Extensible: When k is kept fixed, Di pieces can be
    dynamically added or deleted without affecting the other
    pieces.
   Dynamic: Security can be easily enhanced without
    changing the secret, but by changing the polynomial
    occasionally (keeping the same free term) and
    constructing new shares to the participants.
Useful properties contd..
   Flexible: In organizations where hierarchy is important,
    we can supply each participant different number of pieces
    according to his importance inside the organization. For
    instance, the president can unlock the safe alone, whereas
    3 secretaries are required together to unlock it.
   Efficient algorithms [O(n log2 n)] available for polynomial
    evaluation and interpolation
Available Implementations
   http://sourceforge.net/projects/secretsharejava/
   http://www.christophedavid.org/w/c/w.php/Calculators/Sh
    amirSecretSharing
   http://point-at-infinity.org/ssss/demo.html
   http://www.buttsoft.com/software/tontine/
   http://www.buttsoft.com/software/tontine/java.html
Q&A


  Thank You

More Related Content

What's hot (20)

Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Hash Function
Hash Function Hash Function
Hash Function
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 

Viewers also liked

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemeswonloser
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmNikita Kasar
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionKelum Senanayake
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeKelum Senanayake
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesMax Lee
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESECUNS
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GCKelum Senanayake
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation trainingAIESECGreece
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 ProtocolKelum Senanayake
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionKelum Senanayake
 

Viewers also liked (14)

secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
EP interview question list
EP interview question listEP interview question list
EP interview question list
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Couchbase - Yet Another Introduction
Couchbase - Yet Another IntroductionCouchbase - Yet Another Introduction
Couchbase - Yet Another Introduction
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Security Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in SkypeSecurity Risks & Vulnerabilities in Skype
Security Risks & Vulnerabilities in Skype
 
AIESEC_LCP Interview Slides
AIESEC_LCP Interview SlidesAIESEC_LCP Interview Slides
AIESEC_LCP Interview Slides
 
AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)AIESEC UNS - Frequently Asked Questions (FAQ)
AIESEC UNS - Frequently Asked Questions (FAQ)
 
What you need to know about GC
What you need to know about GCWhat you need to know about GC
What you need to know about GC
 
EP interview preparation training
EP interview preparation trainingEP interview preparation training
EP interview preparation training
 
GPU Programming with Java
GPU Programming with JavaGPU Programming with Java
GPU Programming with Java
 
The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Knight's Tour
Knight's TourKnight's Tour
Knight's Tour
 
EJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another IntroductionEJB 3.0 - Yet Another Introduction
EJB 3.0 - Yet Another Introduction
 

Similar to How to Share a Secret (20)

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
15
1515
15
 
15
1515
15
 
11
1111
11
 
11
1111
11
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Shilpa ppt
Shilpa pptShilpa ppt
Shilpa ppt
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Kleptography
KleptographyKleptography
Kleptography
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Cybersecurity Research Paper
Cybersecurity Research PaperCybersecurity Research Paper
Cybersecurity Research Paper
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 

Recently uploaded

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

How to Share a Secret

  • 1. How to share a secret by Adi Shamir Damitha Premadasa. Kelum Senanayake.
  • 2. Introduction  About author Adi Shamir  An Israeli cryptographer born July 6, 1952.  He is a co-inventor of the RSA algorithm, Feige-Fiat-Shamir Identification Scheme.  One of the inventors of Differential Cryptanalys.  Has made numerous contributions to the fields of cryptography and computer science.  We rely on secrets such as safe combinations, PIN codes, computer passwords, etc.  Secrets can be lost.  Documents get destroyed, Hard disks fail,  People forget, People leave companies, People die...
  • 3. Example key management scenario  Eleven scientists are working on a secret project. They wish to lock up the documents in a cabinet. The cabinet can be opened if and only if six or more of the scientists are present.  What is the smallest number of locks needed?  What is the smallest number of keys to the locks each scientist must carry?  Minimal solution uses 462 locks and 252 keys per scientist.  Drawbacks:  These numbers are clearly impractical  Becomes exponentially worse when the number of scientists increases
  • 4. Key management/cryptographic schemes  What is a Key management system.  Key management is the provisions made in a cryptography system design that are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys.  Properties of key management schemes  Safety  Convenience
  • 5. Shamir's secret-sharing scheme  Why Threshold schemes?  Secret sharing scheme,  Divide secret data (D) in to pieces (n)  Knowledge of some pieces (k) enables to derive secret data (D)  Knowledge of any pieces (k-1) makes secret data (D) completely undetermined.  Such a scheme is called a (k, n) threshold scheme.  Easily computable when have necessary data available  Avoid single point of failure, increase reliability and security  Safety and convenience
  • 6. Shamir's secret-sharing scheme (A simple (k, n) threshold scheme)  Suppose using ( k, n ) threshold scheme to share our secret S.  Choose at random k-1 coefficients a1, a2,.., a(k-1) and let a0=S. Build the polynomial.  q(x) = a0 + a1 * x + a2 *x2 + ... a(k-1) * x(k-1)  Construct D1=q(1), ..., Di=q(i), ..., Dn=q(n).  Given any subset of k pairs, can find S using interpolation  The secret is the constant term a0.
  • 7. Shamir's Secret Sharing scheme  The essential idea of Adi Shamir's threshold scheme,  2 points are sufficient to define a line.  3 points are sufficient to define a parabola.  4 points to define a cubic curve and so forth.  k points to define a polynomial of degree (k - 1)
  • 8. Example  S = 1234, n = 6, k = 3  At random we obtain 2 numbers: a1 = 166, a2 = 94.  Our polynomial to produce secret shares (points) is therefore:  q(x) = 1234 + 166 x + 94x2  We construct 6 points from the polynomial:  (1,1494); (2,1942); (3,2578); (4,3402); (5,4414); (6,5614)  We give each participant a different single point (both x and q(x) ).
  • 9. Example contd…  Reconstruction the secret,  In order to reconstruct the secret any 3 points will be enough.  Let us consider (2,1942); (4,3402); (5,4414);  Using Lagrange basis polynomials, it is possible to construct q(x) hence S value can be derived.
  • 10. Example contd… Let us consider We will compute Lagrange basis polynomials:
  • 12. Useful properties of (k, n) threshold scheme  Secure.  Minimal: The size of each piece does not exceed the size of the original data.  Extensible: When k is kept fixed, Di pieces can be dynamically added or deleted without affecting the other pieces.  Dynamic: Security can be easily enhanced without changing the secret, but by changing the polynomial occasionally (keeping the same free term) and constructing new shares to the participants.
  • 13. Useful properties contd..  Flexible: In organizations where hierarchy is important, we can supply each participant different number of pieces according to his importance inside the organization. For instance, the president can unlock the safe alone, whereas 3 secretaries are required together to unlock it.  Efficient algorithms [O(n log2 n)] available for polynomial evaluation and interpolation
  • 14. Available Implementations  http://sourceforge.net/projects/secretsharejava/  http://www.christophedavid.org/w/c/w.php/Calculators/Sh amirSecretSharing  http://point-at-infinity.org/ssss/demo.html  http://www.buttsoft.com/software/tontine/  http://www.buttsoft.com/software/tontine/java.html
  • 15. Q&A Thank You