How to Share a Secret

How to Share a Secret

November 1979 | Adi Shamir
This paper by Adi Shamir from the Massachusetts Institute of Technology introduces a method to divide data \( D \) into \( n \) pieces such that \( D \) can be easily reconstructed from any \( k \) pieces, but no information about \( D \) can be derived from any fewer than \( k \) pieces. This technique, known as a $(k, n)$ threshold scheme, is particularly useful for robust key management in cryptographic systems, ensuring security and reliability even when parts of the data are lost or compromised. The authors generalize the problem to non-mechanical solutions, where the secret is data \( D \) that can be manipulated. The goal is to divide \( D \) into \( n \) pieces \( D_1, \ldots, D_n \) such that: 1. Knowledge of any \( k \) or more pieces makes \( D \) computable. 2. Knowledge of any \( k-1 \) or fewer pieces leaves \( D \) completely undetermined. This scheme is efficient and practical, especially for managing cryptographic keys. For example, in a company that digitally signs checks, each executive can have a copy of the signature key, making the system convenient while maintaining security. The paper also discusses the trade-offs between secrecy and reliability, and between safety and convenience in various applications. A simple $(k, n)$ threshold scheme is presented based on polynomial interpolation. Given \( k \) points, there is a unique polynomial of degree \( k-1 \) that satisfies these points. The data \( D \) is divided into \( n \) pieces by evaluating this polynomial at \( n \) distinct points. The coefficients are chosen randomly and computed modulo a prime number \( p \). This ensures that knowledge of fewer than \( k \) pieces does not reveal any information about \( D \). The paper highlights several advantages of this scheme, including the size of each piece not exceeding the original data, dynamic addition and deletion of pieces, easy changes to pieces without affecting the original data, and the ability to create hierarchical schemes based on the importance of pieces.This paper by Adi Shamir from the Massachusetts Institute of Technology introduces a method to divide data \( D \) into \( n \) pieces such that \( D \) can be easily reconstructed from any \( k \) pieces, but no information about \( D \) can be derived from any fewer than \( k \) pieces. This technique, known as a $(k, n)$ threshold scheme, is particularly useful for robust key management in cryptographic systems, ensuring security and reliability even when parts of the data are lost or compromised. The authors generalize the problem to non-mechanical solutions, where the secret is data \( D \) that can be manipulated. The goal is to divide \( D \) into \( n \) pieces \( D_1, \ldots, D_n \) such that: 1. Knowledge of any \( k \) or more pieces makes \( D \) computable. 2. Knowledge of any \( k-1 \) or fewer pieces leaves \( D \) completely undetermined. This scheme is efficient and practical, especially for managing cryptographic keys. For example, in a company that digitally signs checks, each executive can have a copy of the signature key, making the system convenient while maintaining security. The paper also discusses the trade-offs between secrecy and reliability, and between safety and convenience in various applications. A simple $(k, n)$ threshold scheme is presented based on polynomial interpolation. Given \( k \) points, there is a unique polynomial of degree \( k-1 \) that satisfies these points. The data \( D \) is divided into \( n \) pieces by evaluating this polynomial at \( n \) distinct points. The coefficients are chosen randomly and computed modulo a prime number \( p \). This ensures that knowledge of fewer than \( k \) pieces does not reveal any information about \( D \). The paper highlights several advantages of this scheme, including the size of each piece not exceeding the original data, dynamic addition and deletion of pieces, easy changes to pieces without affecting the original data, and the ability to create hierarchical schemes based on the importance of pieces.
Reach us at info@study.space