Abstract

In this chapter, we introduce the problem of secret-sharing. We present the generalized secret-sharing scheme of Ito et al. [98] and the threshold secret-sharing scheme of Shamir [135]. While secret-sharing schemes find extensive application in MPC, we showcase here another important application, namely perfectly-secure message transmission. We conclude with demonstrating what can go wrong in a secret-sharing scheme in the face of malicious adversaries. Consider the following application. There is a bank with three managers. There is a locker in the bank, which needs to be opened every day using the help of the managers. Each of the managers has got a password to operate the locker. However, no one trusts any single manager. So we want to design a system where the locker can be opened only if at least two of the managers enter their respective passwords, but the locker should remain inaccessible if only a single manager tries to open it. Similarly, consider a scenario where the passcode of a country’s nuclear missile is shared among the top three entities of the country, say the president, vice-president and the prime-minister in such a way that the missile can be launched only when at least two of these three entities agree to do the same.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The scheme presented here is taken from [120], which is a slight variation of the original scheme as presented in [98].

  2. 2.

    The notation \(f(X) \in _r \mathcal {P}^{s, d}\) denotes that f(X) is a random element of \(\mathcal {P}^{s, d}\).

  3. 3.

    Let \(f(X) = s + f_1X + \ldots + f_tX^t\). To ensure that f(X) is a random polynomial from the set \(\mathcal {P}^{s, t}\), it is sufficient to select the coefficients \(f_1, \ldots , f_t\) uniformly at random from \(\mathbb {F}\).

  4. 4.

    We often use the term Shamir-sharing polynomial to denote the t-degree polynomial used in the algorithm.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Choudhury .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Choudhury, A., Patra, A. (2022). Secret Sharing. In: Secure Multi-Party Computation Against Passive Adversaries. Synthesis Lectures on Distributed Computing Theory. Springer, Cham. https://doi.org/10.1007/978-3-031-12164-7_3

Download citation

Publish with us

Policies and ethics

Navigation