Hardware implementation of secure Shamir's secret sharing scheme

被引:4
|
作者
Luo, Pei [1 ]
Lin, Andy Yu-Lun [1 ]
Wang, Zhen [2 ]
Karpovsky, Mark [1 ]
机构
[1] BU, Reliable Comp Lab, Elect & Comp Engn, Boston, MA 02215 USA
[2] Mediatek Wireless Inc, Boston, MA USA
关键词
Shamir's secret sharing; security; error detection codes; hardware implementation; IDENTIFICATION;
D O I
10.1109/HASE.2014.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect the system from cheating and attacks is a big problem. In this paper, we proposed to use robust codes and algebraic manipulation detection (AMD) codes to protect the secret sharing module. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating and attack models with some extra area and timing overheads.
引用
收藏
页码:193 / 200
页数:8
相关论文
共 50 条
  • [1] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [2] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [3] Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud
    Sadhya, Debanjan
    Agarwal, Akshay
    Raman, Balasubramanian
    [J]. ELEVENTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS AND IMAGE PROCESSING (ICVGIP 2018), 2018,
  • [4] Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing
    Wang, Zhen
    Karpovsky, Mark
    Bu, Lake
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2443 - 2455
  • [5] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [6] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [7] A Modified Shamir Secret Sharing Scheme With Efficient Encoding
    Hineman, Allyson
    Blaum, Mario
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (04) : 758 - 762
  • [8] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [9] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [10] Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
    Nakkar, Mouna
    Altawy, Riham
    Youssef, Amr
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3412 - 3429