24
Dr. Aniket Kate Purdue University Secret Sharing

Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Dr. Aniket Kate Purdue University

Secret Sharing

Page 2: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

2

Page 3: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

2

CertifyingAuthority

sk

Page 4: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

2

IDAlice pkAlice

CertifyingAuthority

sk

Page 5: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 6: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 7: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 8: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 9: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

• Use multi-party computation (MPC) or a distributed authority

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 10: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

• Use multi-party computation (MPC) or a distributed authority

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 11: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

• Use multi-party computation (MPC) or a distributed authority

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 12: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

• Use multi-party computation (MPC) or a distributed authority

• Employ a trusted hardware module that performs cryptographic operations

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 13: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

The cryptographic trust problem

✦ In secure systems, an authority is often required to• protect some secret, and• employ the secret in a manner

defined by the system

✦ How to realize such a trusted party?

• Find such an individual/group/organization, and justify their trustworthiness

• Use multi-party computation (MPC) or a distributed authority

• Employ a trusted hardware module that performs cryptographic operations

2

IDAlice pkAlice

CertifyingAuthority

skAlice pk

Page 14: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Secret Sharing

✦ The notion of secret sharing was introduced independently by Shamir and Blakley in 1979

✦ For integers n and t such that n > t >= 0, an (n,t)-secret sharing (SS) scheme is a method used by a dealer D • to share a secret s among a set of n parties (the sharing

phase) in such a way that • in the reconstruction phase any subset of t+1 or more

parties can compute s, but subsets of size t or fewer cannot

✦ What is the relation between n and t • against a passive adversary controlling any t parties? • against an active adversary controlling any t parties?

3

Page 15: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Secret Sharing Basics

✦ Sharing Phase

4

Page 16: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Secret Sharing Basics

✦ Reconstruction Phase

5

Page 17: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Shamir Secret Sharing

✦ Shamir’s secret sharing based on polynomial evaluations and Lagrange interpolation is the standard SS scheme

✦ To share a secret s є Fp along n < p players, the dealer D • chooses a degree-t polynomial

fD(x) = s + r1x + r2x2 + … + rtxt, for coefficients ri є Fp chosen uniformly at random

• computes and send yi = f(i) to ith node/party; share si = (i, yi) • We represent the output of sharing phase as [s]

✦ Any subset Q of t+1 or more players, can reconstruct the secret s as , where

✦ This secret sharing is additive homomorphic

6

s =P

i2Q �iyi �i =Q

j2Q\{i}j

j�i

Page 18: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Example: (4,1)-Secret Sharing

7

Page 19: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Shamir Secret Sharing Examples

✦ (n,1)-secret sharing

8

✦ (n,2)-secret sharing

Page 20: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Attacks on Secret Sharing

✦ Attacking Secrecy/Privacy

9

Page 21: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Attacks on Secret Sharing

✦ Attacking Correctness

10

Page 22: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Bounding Adversary Behavior

✦ What is the relation between n and t • against a passive adversary controlling any t parties?

• against an active adversary controlling any t parties?(Discussion on the board)

✦ What if the dealer is malicious? • Example Scenarios: Multi-party Computations; Threshold

Cryptography

11

Page 23: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Attacks on Secret Sharing

✦ Attacking Commitment

12

Page 24: Dr. Aniket Kate Purdue University 2016/lectures/… · Secret Sharing The notion of secret sharing was introduced independently by Shamir and Blakley in 1979 For integers n and t

Verifiable Secret Sharing

✦ Secret sharing with three properties • Secrecy

• Correctness

• Commitment

13

(Discussion on the board)