[Resource Topic] 2014/887: Hardware Implementation of Secure Shamir's Secret Sharing Scheme

Welcome to the resource topic for 2014/887

Title:
Hardware Implementation of Secure Shamir’s Secret Sharing Scheme

Authors: Pei Luo, Yu-Lun Lin, Zhen Wang, Mark Karpovsky

Abstract:

Shamir’s secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect the system from cheating and attacks is a big problem. In this paper, we proposed to use robust codes and algebraic manipulation detection (AMD) codes to protect the secret sharing module. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating and attack models with some extra area and timing overheads.

ePrint: https://eprint.iacr.org/2014/887

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .