Discrete Mathematics - Vol 3 | Basics 23 by Abraham | Learn Smarter
Students

Academic Programs

AI-powered learning for grades 8-12, aligned with major curricula

Professional

Professional Courses

Industry-relevant training in Business, Technology, and Design

Games

Interactive Games

Fun games to boost memory, math, typing, and English skills

Basics 23

Basics 23

This chapter introduces the concept of secret sharing in cryptography, particularly focusing on Shamir's (n, t) secret sharing scheme. It explains the motivation behind secret sharing through real-world applications like banking and national security. The chapter discusses the mathematical foundation of secret sharing, including the use of polynomials over finite fields, and details the properties that make the scheme secure against unauthorized access.

8 sections

Enroll to start learning

You've not yet enrolled in this course. Please enroll for free to listen to audio lessons, classroom podcasts and take practice test.

Sections

Navigate through the learning materials and practice exercises.

  1. 1
    Foundations Of Cryptography

    This section introduces the concept of secret sharing in cryptography,...

  2. 1.1
    Secret Sharing Problem Motivation

    The section introduces the concept of secret sharing, highlighting its...

  3. 1.2
    General Problem Definition Of (N, T) Secret Sharing

    The section discusses the (n, t) secret sharing paradigm, where secrets are...

  4. 1.3
    Shamir's (N, T) Secret Sharing Scheme

    Shamir's (n, t) Secret Sharing Scheme offers a method for distributing a...

  5. 1.4
    Description Of Finite Field And Polynomial Properties

    This section discusses the concept of finite fields, relevant properties of...

  6. 2
    Shamir’s Secret Sharing Protocol

    This section introduces Shamir's Secret Sharing Protocol, discussing its...

  7. 2.1
    Setup Of Shamir’s Secret Sharing Scheme

    This section introduces Shamir's Secret Sharing Scheme, explaining its...

  8. 2.2
    Proof Of Privacy In Shamir’s Secret Sharing

    This section delves into Shamir's Secret Sharing scheme, detailing its...

What we have learnt

  • Secret sharing is a method of distributing a secret among a group of participants, ensuring that only a designated number of them can reconstruct the secret.
  • Shamir’s secret sharing scheme uses polynomials and finite fields to securely distribute keys.
  • The requirements of any valid secret-sharing scheme include the impossibility of reconstructing the secret from t or fewer shares and the ability to reconstruct it from t + 1 or more shares.

Key Concepts

-- Secret Sharing
A cryptographic method that enables a secret to be divided into parts, giving each participant a share of the secret. Only a defined number of participants are needed to reconstruct the secret.
-- (n, t) Secret Sharing
A scheme in which a secret is shared among n participants such that any t or fewer participants cannot reconstruct the secret, while any t + 1 participants can.
-- Shamir's Secret Sharing Scheme
A specific implementation of secret sharing developed by Adi Shamir that allows a dealer to share a secret using polynomial functions over a finite field.
-- Finite Fields
Mathematical structures in which numbers wrap around after a certain value (the field size), allowing for operations that maintain a finite set of results and are crucial to the security of secret-sharing schemes.
-- Lagrange’s Interpolation
A method for reconstructing a polynomial from a set of points, which plays a critical role in determining the shared secret from its shares in Shamir's scheme.
-- Polynomial Degree
The highest power of the variable in a polynomial, which in secret sharing determines how many shares can be safely lost without losing the ability to reconstruct the secret.

Additional Learning Materials

Supplementary resources to enhance your learning experience.