Shamir’s Secret Sharing Scheme in Parallel

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 733)

Abstract

A (k, n) threshold secret sharing scheme encrypts a secret s into n parts (called shares), which are distributed into n participants, such that any k participants can recover s using their shares, any group of less than k ones cannot. When the size of s grows large (e.g. multimedia data), the efficiency of sharing/decoding s becomes a major problem. We designed efficient and parallel implementations on Shamir’s threshold secret sharing scheme using sequential CPU and parallel GPU platforms, respectively, in a personal computer. Experimental results show that GPU could achieve an appealing speedup over CPU when dealing with the sharing of multimedia data.

Keywords

Secret sharing Threshold scheme Parallel computing 

References

  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Fang, W.-P.: Parallel processing for secret image sharing. In: International Symposium on Parallel and Distributed, IEEE Proceeding on Processing with Applications (ISPA10), Taipei, Taiwan, pp. 392–396 (2010)Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2005)Google Scholar
  6. 6.
    Silverman, J.H.: Fast multiplication in finite fields GF(2N). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 122–134. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48059-5_12CrossRefGoogle Scholar
  7. 7.
    Pankiewicz, W.: Algorithm 337: calculation of a polynomial and its derivative values by Horner scheme. Commun. ACM 11(9), 633 (1968)CrossRefGoogle Scholar
  8. 8.
    Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242–268. Springer, Heidelberg (1985).  https://doi.org/10.1007/3-540-39568-7_20CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringMing Chuan UniversityTaoyuanTaiwan

Personalised recommendations