Basics 23
This chapter introduces the concept of secret sharing in cryptography, particularly focusing on Shamir's (n, t) secret sharing scheme. It explains the motivation behind secret sharing through real-world applications like banking and national security. The chapter discusses the mathematical foundation of secret sharing, including the use of polynomials over finite fields, and details the properties that make the scheme secure against unauthorized access.
Enroll to start learning
You've not yet enrolled in this course. Please enroll for free to listen to audio lessons, classroom podcasts and take practice test.
Sections
Navigate through the learning materials and practice exercises.
What we have learnt
- Secret sharing is a method of distributing a secret among a group of participants, ensuring that only a designated number of them can reconstruct the secret.
- Shamir’s secret sharing scheme uses polynomials and finite fields to securely distribute keys.
- The requirements of any valid secret-sharing scheme include the impossibility of reconstructing the secret from t or fewer shares and the ability to reconstruct it from t + 1 or more shares.
Key Concepts
- -- Secret Sharing
- A cryptographic method that enables a secret to be divided into parts, giving each participant a share of the secret. Only a defined number of participants are needed to reconstruct the secret.
- -- (n, t) Secret Sharing
- A scheme in which a secret is shared among n participants such that any t or fewer participants cannot reconstruct the secret, while any t + 1 participants can.
- -- Shamir's Secret Sharing Scheme
- A specific implementation of secret sharing developed by Adi Shamir that allows a dealer to share a secret using polynomial functions over a finite field.
- -- Finite Fields
- Mathematical structures in which numbers wrap around after a certain value (the field size), allowing for operations that maintain a finite set of results and are crucial to the security of secret-sharing schemes.
- -- Lagrange’s Interpolation
- A method for reconstructing a polynomial from a set of points, which plays a critical role in determining the shared secret from its shares in Shamir's scheme.
- -- Polynomial Degree
- The highest power of the variable in a polynomial, which in secret sharing determines how many shares can be safely lost without losing the ability to reconstruct the secret.
Additional Learning Materials
Supplementary resources to enhance your learning experience.