An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme

被引:0
|
作者
Corniaux, Christian L. F. [1 ]
Ghodosi, Hossein [1 ]
机构
[1] James Cook Univ, Sch Business, Discipline IT, Townsville, Qld 4811, Australia
关键词
Information security; Cryptography; Cryptographic protocol; Information theory; Secret sharing scheme; Shamir;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a k-threshold secret sharing scheme, a dealer who holds a secret s distributes parts of this secret (the shares) to n players; If k or more of these players pool their shares, they are able to determine s, but if less than k of them pool their shares, they cannot infer any information on s. In 1979, Shamir introduced such a scheme, based on polynomial interpolation in a finite field. This scheme is widely used in other cryptographic protocols, because it is simple, elegant and above all information-theoretically secure. There are a few proofs of the scheme's security, but to our knowledge, none of them is entirely based on the information-theoretical entropy function introduced by Shannon in 1948. We propose such a demonstration.
引用
收藏
页码:45 / 47
页数:3
相关论文
共 50 条
  • [1] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
  • [2] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [3] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [4] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [5] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [6] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme
    Pundkar, Sumedh N.
    Shekokar, Narendra
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
  • [7] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [8] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [9] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
  • [10] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220