Shamir’s Secret Sharing Scheme in Parallel

  • Shyong Jian Shyu
  • Ying Zhen Tsai
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 733)


A (k, n) threshold secret sharing scheme encrypts a secret s into n parts (called shares), which are distributed into n participants, such that any k participants can recover s using their shares, any group of less than k ones cannot. When the size of s grows large (e.g. multimedia data), the efficiency of sharing/decoding s becomes a major problem. We designed efficient and parallel implementations on Shamir’s threshold secret sharing scheme using sequential CPU and parallel GPU platforms, respectively, in a personal computer. Experimental results show that GPU could achieve an appealing speedup over CPU when dealing with the sharing of multimedia data.


Secret sharing Threshold scheme Parallel computing 


  1. 1.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Fang, W.-P.: Parallel processing for secret image sharing. In: International Symposium on Parallel and Distributed, IEEE Proceeding on Processing with Applications (ISPA10), Taipei, Taiwan, pp. 392–396 (2010)Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2005)Google Scholar
  6. 6.
    Silverman, J.H.: Fast multiplication in finite fields GF(2N). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 122–134. Springer, Heidelberg (1999). Scholar
  7. 7.
    Pankiewicz, W.: Algorithm 337: calculation of a polynomial and its derivative values by Horner scheme. Commun. ACM 11(9), 633 (1968)CrossRefGoogle Scholar
  8. 8.
    Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 242–268. Springer, Heidelberg (1985). Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringMing Chuan UniversityTaoyuanTaiwan

Personalised recommendations