Back to Search Start Over

Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing.

Authors :
Wang, Zhen
Karpovsky, Mark
Bu, Lake
Source :
IEEE Transactions on Computers. Aug2016, Vol. 65 Issue 8, p2443-2455. 13p.
Publication Year :
2016

Abstract

Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. The security of the unprotected sharing scheme, however, can be easily broken by cheaters or attackers who maliciously feed incorrect shares during the secret recovery stage or inject faults into hardware computing the secret. In this paper, we propose cheater detection and identification schemes based on robust and algebraic manipulation detection (AMD) codes and m-disjunct matrices (superimposed codes). We present the constructions of codes for cheater detection and identification and describe how the cheater identification problem can be related to the classic group testing algorithms based on m-disjunct matrices. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating attack models with reasonable area and timing overheads. [ABSTRACT FROM PUBLISHER]

Details

Language :
English
ISSN :
00189340
Volume :
65
Issue :
8
Database :
Academic Search Index
Journal :
IEEE Transactions on Computers
Publication Type :
Academic Journal
Accession number :
116814261
Full Text :
https://doi.org/10.1109/TC.2015.2485220