Secret Sharing - Computationally Secure Secret Sharing

Computationally Secure Secret Sharing

The disadvantage of unconditionally secure secret sharing schemes is that the storage and transmission of the shares requires an amount of storage and bandwidth resources equivalent to the size of the secret times the number of shares. If the size of the secret were significant, say 1 GB, and the number of shares were 10, then 10 GB of data must be stored by the shareholders. Alternate techniques have been proposed for greatly increasing the efficiency of secret sharing schemes, by giving up the requirement of unconditional security.

One of these techniques, known as secret sharing made short, combines Rabin's information dispersal algorithm (IDA) with Shamir's secret sharing. Data is first encrypted with a randomly generated key, using a symmetric encryption algorithm. Next this data is split into N pieces using Rabin's IDA. This IDA is configured with a threshold, in a manner similar to secret sharing schemes, but unlike secret sharing schemes the size of the resulting data grows by a factor of (number of fragments / threshold). For example, if the threshold were 10, and the number of IDA-produced fragments were 15, the total size of all the fragments would be (15/10) or 1.5 times the size of the original input. In this case, this scheme is 10 times more efficient than if Shamir's scheme had been applied directly on the data. The final step in secret sharing made short is to use Shamir secret sharing to produce shares of the randomly generated symmetric key (which is typically on the order of 16–32 bytes) and then give one share and one fragment to each shareholder.

A related approach, known as AONT-RS, applies an All-or-nothing transform to the data as a pre-processing step to an IDA. The All-or-nothing transform guarantees that any number of shares less than the threshold is insufficient to decrypt the data.

Read more about this topic:  Secret Sharing

Famous quotes containing the words secure, secret and/or sharing:

    One of the reforms to be carried out during the incoming administration is a change in our monetary and banking laws, so as to secure greater elasticity in the forms of currency available for trade and to prevent the limitations of law from operating to increase the embarrassment of a financial panic.
    William Howard Taft (1857–1930)

    Euphemisms are not, as many young people think, useless verbiage for that which can and should be said bluntly; they are like secret agents on a delicate mission, they must airily pass by a stinking mess with barely so much as a nod of the head, make their point of constructive criticism and continue on in calm forbearance. Euphemisms are unpleasant truths wearing diplomatic cologne.
    Quentin Crisp (b. 1908)

    The cup of blessing that we bless, is it not a sharing in the blood of Christ? The bread that we break, is it not a sharing in the body of Christ?
    Bible: New Testament, 1 Corinthians 10:16.