Cryptology ePrint Archive: Report 2014/887

Hardware Implementation of Secure Shamir's Secret Sharing Scheme

Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky

Abstract: Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect the system from cheating and attacks is a big problem. In this paper, we proposed to use robust codes and algebraic manipulation detection (AMD) codes to protect the secret sharing module. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating and attack models with some extra area and timing overheads.

Category / Keywords: implementation / Secret sharing

Original Publication (with minor differences): High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on

Date: received 27 Oct 2014, last revised 30 Oct 2014

Contact author: silenceluo at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20141030:204306 (All versions of this report)

Short URL: ia.cr/2014/887

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]