Ch12. Secret Sharing Schemes

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Visual Cryptography Moni Naor Adi Shamir Presented By:
ONE WAY FUNCTIONS SECURITY PROTOCOLS CLASS PRESENTATION.
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
How to Collaborate between Threshold Secret Sharing Schemes Daoshun Wang, Ziwei YeXiaobo Li Tsinghua University, ChinaUniversity of Alberta, Canada.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Asymmetric-Key Cryptography
Data encryption with big prime numbers
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Session 4 Asymmetric ciphers.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
CNS2010handout 10 :: digital signatures1 computer and network security matt barrie.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Secret Sharing Algorithms
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
Key Recovery and Secret Sharing -- Towards balancing the interests of individuals and those of governments --
Codes, Ciphers, and Cryptography-RSA Encryption
Public Key Model 8. Cryptography part 2.
8. Data Integrity Techniques
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.

10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Great Theoretical Ideas in Computer Science.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Introduction to Cryptography
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Great Theoretical Ideas in Computer Science.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
What use are prime numbers? ?. o All the primes, apart from 2, are odd numbers. o 1 is not a prime number. Why? o There are infinitely many prime numbers!
Prepared by Dr. Lamiaa Elshenawy
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
Introduction to Cryptography Lecture 9. Public – Key Cryptosystems Each participant has a public key and a private key. It should be infeasible to determine.
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
28 September 2005 Secret Sharing Amin Y. Teymorian Department of Computer Science The George Washington University.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013,
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Cryptographic Protocols Secret sharing, Threshold Security
Public Key Cryptography
Ch12. Secret Sharing Schemes
Cryptography CS 555 Lecture 22
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Cryptology Design Fundamentals
Secret Image Sharing Based on Encrypted Pixels
Secret image sharing with steganography and authentication
Cryptographic Protocols Secret Sharing, Threshold Security
Homework #3 Consider a verifyable secret sharing scheme (VSS) based on Shamir's polynomial secret sharing as follows. A dealer has a secret S, a public.
Presentation transcript:

Ch12. Secret Sharing Schemes Imagine that you have made billions of £$ from Internet stocks, and you wish to leave your estate to your 4 children. You like to divide it among them in such a way that two of them have to get together to reconstruct the real combination, i.e., someone who wants some of the inheritance must somehow cooperate with one of the other children. (t,w)=(2,4) - threshold scheme

Definition Let t≦w be positive integers. A (t,w)-threshold scheme is a method of sharing a message M among a set of w participants such that any subset consisting of t participants can reconstruct the message M, but no subsets of smaller size can reconstruct M.

Shamir threshold scheme in 1979 Based on Lagrange interpolation polynomial Also called Lagrange interpolation scheme Choose a large prime p, the message M is represented as a number (mod p) s(x)≡M+s1x+s2x2+…+st-1xt-1 (mod p) (xi,yi), i=1,2, …, w; yi≡s(xi) (mod p)

Lagrange Interpolating Polynomials Suppose that the function y=f(x) is known at the n+1 points (x0,y0), (x1,y1), … (xn,yn), where a≤ x0 <x1 <x2 …< xn≤b, then there is a polynomial Pn(xi)=yi, 0≤i≤n

Computing Secret Value M

Simple Exercises from p.303-306 2. You set up a (2,30) Shamir threshold scheme, working mod the prime 101. Two of the shares are (1,13) and (3,12). Another person received the share (2,*), what is the value of *? 3. In a (3,5) Shamir secret sharing scheme with modulus p=17, the following were given to Alice, Bob, Charles: (1,8), (3,10), (5,11). Calculate the corresponding Lagrange interpolating polynomial, and identify the secret.

(Secret) Value Sharing A (k, n) threshold secret sharing should satisfy the following requirements: (1) A secret value M is used to generate n shadows. (2) Any ≧k shadows can reconstruct the secret value M. (3) Any <k shadows can not get sufficient information to reveal the secret value M.

s(x) ≡ M+s1x+s2x2+…+sk-1xk-1 (mod p) Secret Sharing (1/4) A (k, n) threshold polynomial can be written by s(x) ≡ M+s1x+s2x2+…+sk-1xk-1 (mod p) Select n distinct integer x1,x2,…,xn form [0,p-1] Deliver (xi,s(xi)) to the i-th participant p= a (large) prime number M: secret value s1,…,sk-1: randomly chosen from [0, p-1]

Secret Sharing (2/4) To reveal the secret value M, we must collect (at least k) ≧k shadows. Without loss of generality, we use (x1,s(x1)),…, (xk,s(xk)) as k shadows. We can reveal the secret value M by using Lagrange interpolation. where M=s(0)

Secret Sharing (3/4) Example: (k, n)=(2, 4)-threshold secret sharing Given x1=1,x2=2,x3=3,x4=4 A polynomial equation can be defined as s(x) ≡ 9+13x mod 17 Then s(1)=5, s(2)=1, s(3)=14, s(4)=10 Four shadows: (1,5), (2,1), (3,14), (4,10)

Secret Sharing (4/4) Example We can get the equation by taking (1,5), (4,10) by using Lagrange interpolation. s(0)=9

Secret Image Sharing A (k, n)-threshold secret image sharing msut satisfy the following requirements: (1)The secret image S is used to generate n shadow images. (2)Any ≧k shadow images can reconstruct the secret image. (3)Any <k shadow images can not get sufficient information to reveal the secret image.

Generation of Shadow Images Pre-operation

Scramble a Secret Image Pre-operation: All gray levels are in the range [0,255] Let p=251 Suppress all values larger than 250 to 250. -The values are in the range 0~250 -A Lossy method Select a key P to create a permutation matrix. -To decrease the correlation between any neighboring pixels.

Meaningless Shadow Images Share

Shadow Images Acquisition The equation can be written by g(x)≡a0+a1x+a2x2+…+ak-1xk-1 mod 251 Select n distinct secret keys x1,x2,…,xn. Deliver (xi,s(xi)) to the ith participant.

Get the Permutation Image

Secret Image Reconstruction Without loss of generality, we have (x1,s(x1)),(x2,s(x2)),…, (xk,s(xk)). Use Lagrange interpolation to reconstruct the image.

Flowchart of Recovery

An Example Without Permutation

Experimental results The (2,4)-threshold on image Lenna 512x512, Histogram of Lenna The secret image The permutation image (1,s(1)) (2,s(2)) (3,s(3)) (4,s(4))

Security Analysis Without loss of generality, if we only have (k-1) shadow images. y1 ≡ (a0+a1+…+ak-1) mod p y2 ≡ (a0+2a1+…+2k-1ak-1) mod p … yk-1 ≡ (a0+(k-1)a1+…+(k-1)(k-1)ak-1) mod p The probability to get the right image is

Property and Conclusion A lossy method The size of each shadow image is 1/r of the secret image Fault-tolerance Use network hard disks for storage. Steganography …

References W. Trappe and l.C. Washington, Introduction to Cryptography with Coding Theory, Pearson International Edition (2006) C.C. Thien and J.C. Lin, “Secret image sharing,” Computers & Graphics, vol. 26, no. 1, 765-770, 2002.