DocumentCode :
145081
Title :
An entropy-based demonstration of the security of Shamir´s secret sharing scheme
Author :
Corniaux, Christian L. F. ; Ghodosi, Hossein
Author_Institution :
Sch. of Bus., James Cook Univ., Townsville, QLD, Australia
Volume :
1
fYear :
2014
fDate :
26-28 April 2014
Firstpage :
46
Lastpage :
48
Abstract :
In a k-threshold secret sharing scheme, a dealer who holds a secret s distributes parts of this secret (the shares) to n players; If k or more of these players pool their shares, they are able to determine s, but if less than k of them pool their shares, they cannot infer any information on s. In 1979, Shamir introduced such a scheme, based on polynomial interpolation in a finite field. This scheme is widely used in other cryptographic protocols, because it is simple, elegant and above all information-theoretically secure. There are a few proofs of the scheme´s security, but to our knowledge, none of them is entirely based on the information-theoretical entropy function introduced by Shannon in 1948. We propose such a demonstration.
Keywords :
cryptographic protocols; entropy; interpolation; polynomials; security of data; Shamir secret sharing scheme; cryptographic protocols; entropy-based demonstration; finite field; information security; k-threshold secret sharing scheme; polynomial interpolation; Cryptography; Entropy; Information theory; Polynomials; Protocols; Random variables; Cryptographic protocol; Cryptography; Information security; Information theory; Secret sharing scheme; Shamir;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Science, Electronics and Electrical Engineering (ISEEE), 2014 International Conference on
Conference_Location :
Sapporo
Print_ISBN :
978-1-4799-3196-5
Type :
conf
DOI :
10.1109/InfoSEEE.2014.6948065
Filename :
6948065
Link To Document :
بازگشت