Hardware implementation of secure Shamir's secret sharing scheme

被引:4
|
作者
Luo, Pei [1 ]
Lin, Andy Yu-Lun [1 ]
Wang, Zhen [2 ]
Karpovsky, Mark [1 ]
机构
[1] BU, Reliable Comp Lab, Elect & Comp Engn, Boston, MA 02215 USA
[2] Mediatek Wireless Inc, Boston, MA USA
关键词
Shamir's secret sharing; security; error detection codes; hardware implementation; IDENTIFICATION;
D O I
10.1109/HASE.2014.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect the system from cheating and attacks is a big problem. In this paper, we proposed to use robust codes and algebraic manipulation detection (AMD) codes to protect the secret sharing module. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating and attack models with some extra area and timing overheads.
引用
收藏
页码:193 / 200
页数:8
相关论文
共 50 条
  • [41] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    [J]. 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [42] Toward a secure protection scheme for visual secret sharing
    Lee, C. -C.
    Lee, C. -C.
    Liu, H. -T.
    Tsai, C. -S.
    [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (06): : 342 - 352
  • [43] Encryption On Grayscale Image For Digital Image Confidentiality Using Shamir Secret Sharing Scheme
    Rodiah
    Anggraini, Dyah
    Fitrianingsih
    Kazhimi, Farizan
    [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [44] Building a Secure Scheme for a Trusted Hardware Sharing Environment
    Lu, Di
    Ma, Jianfeng
    Sun, Cong
    Wu, Qixuan
    Sun, Zhaochang
    Xl, Ning
    [J]. IEEE ACCESS, 2017, 5 : 20260 - 20271
  • [45] Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image
    Bi X.
    Yan W.
    Qiu Y.
    Xiao B.
    Li W.
    Ma J.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1356 - 1369
  • [46] Authentication as A Service Based on Shamir Secret Sharing
    Bissoli, Andrea
    d'Amore, Fabrizio
    [J]. 2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
  • [47] Efficient Computation Method of Participants' Weights in Shamir's Secret Sharing
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Li, Jingjing
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 598 - 605
  • [48] A 256 Bit Implementation of ECC-RFID Based System using Shamir Secret Sharing Scheme and Keccak Hash Function
    Al-Adhami, Ayad
    Ambroze, Marcel
    Stengel, Ingo
    Tomlinson, Martin
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 165 - 171
  • [49] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [50] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649