Abstract
In this chapter, we introduce the problem of secret-sharing. We present the generalized secret-sharing scheme of Ito et al. [98] and the threshold secret-sharing scheme of Shamir [135]. While secret-sharing schemes find extensive application in MPC, we showcase here another important application, namely perfectly-secure message transmission. We conclude with demonstrating what can go wrong in a secret-sharing scheme in the face of malicious adversaries. Consider the following application. There is a bank with three managers. There is a locker in the bank, which needs to be opened every day using the help of the managers. Each of the managers has got a password to operate the locker. However, no one trusts any single manager. So we want to design a system where the locker can be opened only if at least two of the managers enter their respective passwords, but the locker should remain inaccessible if only a single manager tries to open it. Similarly, consider a scenario where the passcode of a country’s nuclear missile is shared among the top three entities of the country, say the president, vice-president and the prime-minister in such a way that the missile can be launched only when at least two of these three entities agree to do the same.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The scheme presented here is taken from [120], which is a slight variation of the original scheme as presented in [98].
- 2.
The notation \(f(X) \in _r \mathcal {P}^{s, d}\) denotes that f(X) is a random element of \(\mathcal {P}^{s, d}\).
- 3.
Let \(f(X) = s + f_1X + \ldots + f_tX^t\). To ensure that f(X) is a random polynomial from the set \(\mathcal {P}^{s, t}\), it is sufficient to select the coefficients \(f_1, \ldots , f_t\) uniformly at random from \(\mathbb {F}\).
- 4.
We often use the term Shamir-sharing polynomial to denote the t-degree polynomial used in the algorithm.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Choudhury, A., Patra, A. (2022). Secret Sharing. In: Secure Multi-Party Computation Against Passive Adversaries. Synthesis Lectures on Distributed Computing Theory. Springer, Cham. https://doi.org/10.1007/978-3-031-12164-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-12164-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12163-0
Online ISBN: 978-3-031-12164-7
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 11