Secret Sharing - Computationally Secure Secret Sharing

Computationally Secure Secret Sharing

The disadvantage of unconditionally secure secret sharing schemes is that the storage and transmission of the shares requires an amount of storage and bandwidth resources equivalent to the size of the secret times the number of shares. If the size of the secret were significant, say 1 GB, and the number of shares were 10, then 10 GB of data must be stored by the shareholders. Alternate techniques have been proposed for greatly increasing the efficiency of secret sharing schemes, by giving up the requirement of unconditional security.

One of these techniques, known as secret sharing made short, combines Rabin's information dispersal algorithm (IDA) with Shamir's secret sharing. Data is first encrypted with a randomly generated key, using a symmetric encryption algorithm. Next this data is split into N pieces using Rabin's IDA. This IDA is configured with a threshold, in a manner similar to secret sharing schemes, but unlike secret sharing schemes the size of the resulting data grows by a factor of (number of fragments / threshold). For example, if the threshold were 10, and the number of IDA-produced fragments were 15, the total size of all the fragments would be (15/10) or 1.5 times the size of the original input. In this case, this scheme is 10 times more efficient than if Shamir's scheme had been applied directly on the data. The final step in secret sharing made short is to use Shamir secret sharing to produce shares of the randomly generated symmetric key (which is typically on the order of 16–32 bytes) and then give one share and one fragment to each shareholder.

A related approach, known as AONT-RS, applies an All-or-nothing transform to the data as a pre-processing step to an IDA. The All-or-nothing transform guarantees that any number of shares less than the threshold is insufficient to decrypt the data.

Read more about this topic:  Secret Sharing

Famous quotes containing the words secure, secret and/or sharing:

    Self-respect—The secure feeling that no one, as yet, is suspicious.
    —H.L. (Henry Lewis)

    If we confine ourselves to a general and distant reflection on the ills of human life, that can have no effect to prepare us for them. If by close and intense meditation we render them present and intimate to us, that is the true secret for poisoning all our pleasures, and rendering us perpetually miserable.
    David Hume (1711–1776)

    By sharing the information and observations with the caregiver, you have a chance to see your child through another pair of eyes. Because she has some distance and objectivity, a caregiver often sees things that a parent’s total involvement with her child doesn’t allow.
    Amy Laura Dombro (20th century)