Lecture Notes in Secret Sharing

نویسنده

  • Carles Padró
چکیده

Preface These are basically the lecture notes for the short course Applications of Combinatorics to 2012. With the objective of covering a full course on secret sharing, additional content will be added in subsequent versions of these lecture notes. Secret sharing, which was independently introduced in 1979 by Shamir [49] and Blak-ley [6], is one of the most widely studied topics in information-theoretic cryptography. In a secret sharing scheme, a secret value is distributed into shares among a set of participants is such a way that only some qualified coalitions of participants can recover the secret value from their shares. One can think immediately on possible applications of secret sharing. The first one, proposed by the pioneering authors [6, 49], was safe storage of cryptographic keys. Nevertheless, a number of much less obvious applications of secret sharing to different kinds of cryptographic protocols have appeared. Arguably, the most interesting one is secure multiparty Similarly to other topis in cryptography, research in secret sharing has attracted a lot of attention. Shortly after its introduction, difficult open problems appeared, and the attempts to solve them have involved several areas of mathematics. We focus here mainly on the ones involving matroid theory. Unfortunately, no textbook on secret sharing has appeared yet, but two excellent surveys [1, 54] are available. The reader is referred to [20, 56] for basic textbooks on cryptography. The textbooks on matroid theory by Oxley [44] and by Welsh [57] may be useful too. 5 6 CONTENTS

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Notes on Secret Sharing

These are lecture notes from the first two lectures in Fall 2016, focusing on technical material we saw for secret sharing (including a proof by reduction using the hybrid proof technique). The notes do not include the general introduction to the course and modern crypto, as well as some discussion and motivation for secret sharing. Also not covered here is Shamir’s secret sharing, which we saw...

متن کامل

Multiparty Computation, an Introduction

These lecture notes introduce the notion of secure multiparty computation. We introduce some concepts necessary to define what it means for a multiparty protocol to be secure, and survey some known general results that describe when secure multiparty computation is possible. We then look at some general techniques for building secure multiparty protocols, including protocols for commitment and ...

متن کامل

Cryptographic Protocols Notes for Lecture 8 Scribe

A t-out-of-n secret-sharing scheme allows an honest dealer D to distribute a secret s among n players, such that any subset of t players has no information about s, but every set of t + 1 players can collaboratively reconstruct the secret. The most famous secret-sharing scheme is Shamir’s Sharing Scheme [Sha79] (cf. Section 8.1.2). It uses polynomials to obtain the desired properties. Before pr...

متن کامل

New visual secret sharing schemes using probabilistic method

Visual secret sharing (VSS) scheme is a perfect secure method that protects a secret image by breaking it into shadow images (called shadows). Unlike other threshold schemes, VSS scheme can be easily decoded by the human visual system without the knowledge of cryptography and cryptographic computations. However, the size of shadow images (i.e., the number of columns of the black and white matri...

متن کامل

Notes for Lecture 7 Information

Last lecture we saw an n-out-of-n secret sharing protocol, meaning that all n users together are able to reconstruct the message, but already n − 1 users fail to learn anything about it. Shamir’s Secret Sharing is a t-out-of-n protocol, meaning that already t ≤ n users together can learn the message, but any t − 1 do not learn anything. We only give a brief description of it. The protocol works...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012