2/23/2017 1
Adi Shamir, “How to Share a Secret,” CACM November 1979 CACM, November 1979.
2/23/2017 Secret shares (S. S. Lam) 1
Adi Shamir, How to Share a Secret, CACM November 1979 CACM , November - - PowerPoint PPT Presentation
2/23/2017 Adi Shamir, How to Share a Secret, CACM November 1979 CACM , November 1979. 2/23/2017 Secret shares (S. S. Lam) 1 1 2/23/2017 How to share a secret [Shamir 1979] ( K N ) th ( K , N ) threshold scheme h ld h Secret D is
2/23/2017 1
2/23/2017 Secret shares (S. S. Lam) 1
2/23/2017 2
2/23/2017 Secret shares (S. S. Lam) 2
2/23/2017 3
K yK) i
1 1 1
K K
− −
1
i N
2/23/2017 Secret shares (S. S. Lam) 3
1
i N
2/23/2017 4
(such as using the interpolation polynomial in the Lagrange form (such as, using the interpolation polynomial in the Lagrange form
2/23/2017 Secret shares (S. S. Lam) 4
2/23/2017 5
1,
K 1 ,
2/23/2017 Secret shares (S. S. Lam) 5
2/23/2017 6
2/23/2017 Secret shares (S. S. Lam) 6
2/23/2017 7
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, “Providing Robust and Ubiquitous Security Support for Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” Proceedings IEEE ICNP 2001. Comment - Shamir’s method requires a secure and trusted
mobile ad hoc networks which do not have access to a secure d d h d l d h f ld h d and trusted server when deployed in the field. The proposed solution is interesting but incomplete.
2/23/2017 Secret shares (S. S. Lam) 7
2/23/2017 8
2/23/2017 Secret shares (S. S. Lam) 8