. The decision of values for and controls the strength of the system.Choose at random coefficients , and let . Build polynomial . Let us construct any points out of it, for instance set to retrieve . Every participant is given a point (a pair of input to the polynomial and output).Given any subset of of these pairs, we can find the coefficients of the polynomial by polynomial curve fitting, and then evaluate , which is the secret.
Usage
Example
Preparation
Suppose that our secret is our ATM code: 1234 .
We wish to divide the secret into 6 parts , where any subset of 3 parts is sufficient to reconstruct the secret. At random we obtain 2 numbers: 166, 94.
Our polynomial to produce secret shares (points) is therefore:
We construct 6 points from the polynomial:
We give each participant a different single point (both and ).
Reconstruction
In order to reconstruct the secret any 3 points will be enough.
Let us consider .
We will compute Lagrange basis polynomials:
Therefore
Recall that the secret is the free coefficient, which means that , and we are done.
Properties
Some of the useful properties of Shamir's threshold scheme are:
# Secure: Information theoretic security.
# Minimal: The size of each piece does not exceed the size of the original data.
# Extensible: When is kept fixed, pieces can be dynamically added or deleted (e.g., when scientists are fired or suddenly die) without affecting the other pieces.
# Dynamic: Security can be easily enhanced without changing the secret, but by changing the polynomial occasionally (keeping the same free term) and constructing new shares to the participants.
# Flexible: In organizations where hierarchy is important, we can supply each participant different number of pieces according to his importance inside the organization. For instance, the president can unlock the safe alone, whereas 3 secretaries are required together to unlock it.
ee also
* Secret sharing
* Lagrange polynomial
* Homomorphic secret sharing - A simplistic decentralized voting protocol.
References
*citation
last = Shamir
first = Adi
authorlink = Adi Shamir
title = How to share a secret
journal = Communications of the ACM
volume = 22
issue = 11
pages = 612-613
yeat = 1979
doi = 10.1145/359168.359176.
*citation|last=Liu|first=C. L.|authorlink=Chung Laung Liu|title=Introduction to Combinatorial Mathematics|publisher=McGraw-Hill|location=New York|year=1968.
*citation|last1=Dawson|first1=E.|last2=Donovan|first2=D.|year=1994|title=The breadth of Shamir's secret-sharing scheme|journal=Computers & Security|volume=13|pages=69–78.
*citation|last=Knuth|first=D. E.|authorlink=Donald Knuth|year=1997|title=The Art of Computer Programming|edition=3rd|volume=II: Seminumerical Algorithms|page=505|publisher=Addison-Wesley.
External links
* [http://charles.karney.info/misc/secret.html A perl implementaton of Shamir's Secret Sharing]
* [http://point-at-infinity.org/ssss/index.html ssss: A free (GPL) implementation of Shamir's Scheme]
* [http://sourceforge.net/projects/secretsharp/ Secret Sharp: A free (GPL) implementation of Shamir's Scheme for windows]