a latin square autotopism secret sharing scheme
play

A Latin square autotopism secret sharing scheme Talk by Rebecca J. - PowerPoint PPT Presentation

A Latin square autotopism secret sharing scheme Talk by Rebecca J. Stones Co-authors: Ming Su, Xiaoguang Liu, Gang Wang, (Nankai University) and Sheng Lin (Tianjin University of Technology). September 12, 2014 Secret sharing schemes Secret


  1. A Latin square autotopism secret sharing scheme Talk by Rebecca J. Stones Co-authors: Ming Su, Xiaoguang Liu, Gang Wang, (Nankai University) and Sheng Lin (Tianjin University of Technology). September 12, 2014

  2. Secret sharing schemes Secret sharing schemes describe how to distribute pieces of information, called shares , among participants so that:

  3. Secret sharing schemes Secret sharing schemes describe how to distribute pieces of information, called shares , among participants so that: if the participants cooperate, their collective shares can be used to recover a secret message, and

  4. Secret sharing schemes Secret sharing schemes describe how to distribute pieces of information, called shares , among participants so that: if the participants cooperate, their collective shares can be used to recover a secret message, and if too few participants cooperate, then the secret cannot be recovered.

  5. A toy example... share 1 share 2 � �� � � �� �     1 0 1 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 1 0     1 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0          0 0 1 0 0 1 0 1 1 0   0 1 1 1 0 1 0 0 1 0          1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 0          0 1 1 1 0 0 0 0 1 1   1 1 1 0 0 0 0 0 1 0          0 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0             1 1 0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0          0 1 1 1 0 0 0 0 1 0   0 1 0 1 0 1 0 0 1 1          1 1 1 0 1 1 0 1 0 0 1 1 1 1 1 0 1 1 0 0     1 0 1 1 0 1 0 0 0 1 1 0 1 1 1 1 1 1 0 1

  6. A toy example... share 1 share 2 addition modulo 2 reveals secret � �� � � �� � � �� �       1 0 1 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 1 0 0 1 0 0 1 1 0 0 0 0       1 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 0              0 0 1 0 0 1 0 1 1 0   0 1 1 1 0 1 0 0 1 0   0 1 0 1 0 0 0 1 0 0              1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 1 0                 0 1 1 1 0 0 0 0 1 1  1 1 1 0 0 0 0 0 1 0  1 0 0 1 0 0 0 0 0 1       + =       0 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0                   1 1 0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 0 1 0 0 0 0 0 0 1 1             0 1 1 1 0 0 0 0 1 0 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 1 0 0 0 1                   1 1 1 0 1 1 0 1 0 0 1 1 1 1 1 0 1 1 0 0 0 0 0 1 0 1 1 0 0 0       1 0 1 1 0 1 0 0 0 1 1 0 1 1 1 1 1 1 0 1 0 0 0 0 1 0 1 1 0 0

  7. A toy example... share 1 share 2 addition modulo 2 reveals secret � �� � � �� � � �� �       1 0 1 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 1 0 0 1 0 0 1 1 0 0 0 0       1 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 0              0 0 1 0 0 1 0 1 1 0   0 1 1 1 0 1 0 0 1 0   0 1 0 1 0 0 0 1 0 0              1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 1 0                 0 1 1 1 0 0 0 0 1 1  1 1 1 0 0 0 0 0 1 0  1 0 0 1 0 0 0 0 0 1       + =       0 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0                   1 1 0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 0 1 0 0 0 0 0 0 1 1             0 1 1 1 0 0 0 0 1 0 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 1 0 0 0 1                   1 1 1 0 1 1 0 1 0 0 1 1 1 1 1 0 1 1 0 0 0 0 0 1 0 1 1 0 0 0       1 0 1 1 0 1 0 0 0 1 1 0 1 1 1 1 1 1 0 1 0 0 0 0 1 0 1 1 0 0 We can’t find the secret without both shares.

  8. A toy example... share 1 share 2 addition modulo 2 reveals secret � �� � � �� � � �� �       1 0 1 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 1 0 0 1 0 0 1 1 0 0 0 0       1 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 0              0 0 1 0 0 1 0 1 1 0   0 1 1 1 0 1 0 0 1 0   0 1 0 1 0 0 0 1 0 0              1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 1 0                 0 1 1 1 0 0 0 0 1 1  1 1 1 0 0 0 0 0 1 0  1 0 0 1 0 0 0 0 0 1       + =       0 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0                   1 1 0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 0 1 0 0 0 0 0 0 1 1             0 1 1 1 0 0 0 0 1 0 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 1 0 0 0 1                   1 1 1 0 1 1 0 1 0 0 1 1 1 1 1 0 1 1 0 0 0 0 0 1 0 1 1 0 0 0       1 0 1 1 0 1 0 0 0 1 1 0 1 1 1 1 1 1 0 1 0 0 0 0 1 0 1 1 0 0 We can’t find the secret without both shares. We can choose share 1 uniformly at random.

  9. A toy example... share 1 share 2 addition modulo 2 reveals secret � �� � � �� � � �� �       1 0 1 0 0 1 1 0 1 0 1 1 1 0 1 0 1 0 1 0 0 1 0 0 1 1 0 0 0 0       1 1 1 1 1 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 0              0 0 1 0 0 1 0 1 1 0   0 1 1 1 0 1 0 0 1 0   0 1 0 1 0 0 0 1 0 0              1 0 1 1 1 0 1 1 1 0 1 0 0 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 1 0                 0 1 1 1 0 0 0 0 1 1  1 1 1 0 0 0 0 0 1 0  1 0 0 1 0 0 0 0 0 1       + =       0 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0                   1 1 0 1 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 0 1 0 0 0 0 0 0 1 1             0 1 1 1 0 0 0 0 1 0 0 1 0 1 0 1 0 0 1 1 0 0 1 0 0 1 0 0 0 1                   1 1 1 0 1 1 0 1 0 0 1 1 1 1 1 0 1 1 0 0 0 0 0 1 0 1 1 0 0 0       1 0 1 1 0 1 0 0 0 1 1 0 1 1 1 1 1 1 0 1 0 0 0 0 1 0 1 1 0 0 We can’t find the secret without both shares. We can choose share 1 uniformly at random. And choose share 2 to so that “share 1 + share 2” reveals the secret.

  10. Shamir’s Secret Sharing Scheme Adi Shamir (of RSA fame) developed a secret sharing scheme. ( How to share a secret (1979), Comm. ACM.)

  11. Shamir’s Secret Sharing Scheme Adi Shamir (of RSA fame) developed a secret sharing scheme. ( How to share a secret (1979), Comm. ACM.) We have ℓ participants,

  12. Shamir’s Secret Sharing Scheme Adi Shamir (of RSA fame) developed a secret sharing scheme. ( How to share a secret (1979), Comm. ACM.) We have ℓ participants, a secret number c , and

  13. Shamir’s Secret Sharing Scheme Adi Shamir (of RSA fame) developed a secret sharing scheme. ( How to share a secret (1979), Comm. ACM.) We have ℓ participants, a secret number c , and we want any t of the participants to be able to recover the secret.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend