Shamir Knows Alice and Bob's Shared Secret
a brief introduction to secret sharing
Thom Dixon <thomdixon@ufl.edu>
a brief introduction to secret sharing
First...
Contrived motivation
Once again, with precision
Shamir's clever idea
(n, k)-threshold scheme.
Shamir Secret Sharing
Consequences
Consequences (cont'd.)
Applications
Applications (cont'd.)
Applications (cont'd.)
Relax a little
Semantic security
Semantic security (cont'd.)
Reed-Solomon codes
Krawczyk's clever twist
Consequences
Applications
AONTs
AONTs (cont'd.)
XOR
Block Ciphers
Hash Functions
Package Transform
Considerations
Applications
Asmuth-Bloom Scheme
Asmuth-Bloom (cont'd.)
Asmuth-Bloom (cont'd.)
Consequences & Applications
Other schemes
Questions/Comments?
Slides available at thomdixon.org.