Professional Documents
Culture Documents
3 - FODAY JORH - Secret - Sharing - Algorithms
3 - FODAY JORH - Secret - Sharing - Algorithms
Secret Sharing
• Let n=5; t=3 the dealer choses P=17; Xi=L, 1 ≤t ≤5. let the secret S= 3.
the dealer choose the secret coefficient, A2=15; A1=14
The coefficient A0=3 is the secret. Hence the polynomial is the
a(x)=15X^2+ 14X+3
Thus the share are:
𝑦1 = 𝑎 1 = 15
𝑦2 = 𝑎 2 = 6
𝑦3 = 𝑎 3 = 10
𝑦4 = 𝑎 4 = 10
𝑦5 = ⅆ 5 = 6
What is secret sharing?
• t=1
• t = 1 secret sharing is trivial. The secret can simply be distributed to
all n participants.
• t=n
There are several (t, n) secret-sharing schemes for t = n, when all
shares are necessary to recover the secret:
• 1 < t < n, and, more general, any desired subset of n
• The difficulty lies in creating schemes that are still secure, but do not
require all n shares. For example, imagine that the Board of Directors
of a company would like to protect their secret formula
• The president of the company should be able to access the formula
when needed, but in an emergency any 3 of the 12 board members
would be able to unlock the secret formula together.
Trivial secret sharing
k 1
f ( x) a0 a1 x a2 x ..... a
2
k 1
Shamir's Secret Sharing
• Let S=1234
• n=6 and k=3 and obtain random integers
a1=166 and a2=94
f ( x) 1234 166x 94 x 2
• Secret share points
(1,1494),(2,1942)(3,2598)(4,3402)(5,4414)(6,5614)