Secret sharing | Cryptography

Secret sharing

Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine their 'shares', the secret may be reconstructed. Whereas insecure secret sharing allows an attacker to gain more information with each share, secure secret sharing is 'all or nothing' (where 'all' means the necessary number of shares). In one type of secret sharing scheme there is one dealer and n players. The dealer gives a share of the secret to the players, but only when specific conditions are fulfilled will the players be able to reconstruct the secret from their shares. The dealer accomplishes this by giving each player a share in such a way that any group of t (for threshold) or more players can together reconstruct the secret but no group of fewer than t players can. Such a system is called a (t, n)-threshold scheme (sometimes it is written as an (n, t)-threshold scheme). Secret sharing was invented independently by Adi Shamir and George Blakley in 1979. (Wikipedia).

Secret sharing
Video thumbnail

Keeping Secrets: Cryptography In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to

From playlist Explore the World Science Festival

Video thumbnail

Secret Sharing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Secret Sharing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Understanding Private Browsing

In this video, you’ll learn tips for browsing the web privately. Visit https://edu.gcfglobal.org/en/techsavvy/browsing-privately/1/ to learn even more. We hope you enjoy!

From playlist Internet Tips

Video thumbnail

Is It OK to Keep Secrets From Your Partner?

We’re taught that love requires honesty, and that secrets are anathema to healthy relationships. But there may be very noble reasons for concealing things from our partner - and instances where it is far kinder to lie than reveal hurtful truths. Sign up to our mailing list to receive 10% o

From playlist RELATIONSHIPS

Video thumbnail

The Secrets of Other People's Relationships

Those of us in relationships suffer from an ignorance of what other people’s relationships are really like. We should recognise that episodes of difficulty and ambivalence are not the exception, but the norm. Sign up to our mailing list to receive 10% off your first order with us: https:/

From playlist RELATIONSHIPS

Video thumbnail

Our Secret Fantasies

There’s a lot constantly going in the fantasy part of our minds that sounds pretty strange and at times, frankly, shocking. But coming to terms with our fantasies – and realising they are not our reality – belongs to the art of knowing how to live more easily with ourselves. If you like o

From playlist SELF

Video thumbnail

Cryptography: Codes, Ciphers, and Connections

The encryption of information is as old as information itself. Ever since two people wanted to pass something along, so has there been a third party who wanted to be privy to it. This back and forth battle of creating codes, breaking them, and finding new ones has been happening quietly fo

From playlist Mathematics

Video thumbnail

Secret Sharing Schemes

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Nexus Trimester - Salim El Rouayheb (Illinois Institute of Technology)

Secret Sharing in Distributed Storage Systems Salim El Rouayheb (Illinois Institute of Technology) February 15, 2016 Abstract: Distributed storage systems (DSSs) store large amount of data and make it accessible online, anywhere and anytime. To protect against data loss, the data in DSSs

From playlist Nexus Trimester - 2016 - Fundamental Inequalities and Lower Bounds Theme

Video thumbnail

Some Secure Computation concepts by Manoj Prabhakaran

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

Nexus Trimester - Moni Naor (Wezimann Institute of Science)

How to Share a Secret, Infinitely Moni Naor (Wezimann Institute of Science) March 31, 2016 Abstract: Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties such that only qualified subsets of parties can reconstruct the secret. The collecti

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Breaking the Circuit-Size Barrier in Secret Sharing - Vinod Vaikuntanathan

Computer Science/Discrete Mathematics Seminar I Topic: Breaking the Circuit-Size Barrier in Secret Sharing Speaker: Vinod Vaikuntanathan Affiliation: MIT Date: October 15, 2018 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Half a million secrets | Frank Warren

http://www.ted.com "Secrets can take many forms -- they can be shocking, or silly, or soulful." Frank Warren, the founder of PostSecret.com, shares some of the half-million secrets that strangers have mailed him on postcards. TEDTalks is a daily video podcast of the best talks and perfo

From playlist TED Talk Tuesdays @ Caltech

Video thumbnail

DEFCON 16: Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly

Speaker: Vic Vandal, 504 / NOLAB / NC2600 Have you ever wanted to: •Transmit secret codes and messages •Protect Nuclear launch codes •Dabble in Intellectual Property protection •Warez/file-sharing with legal liability protection •Develop and share terrorist plots •Smuggle illegal substan

From playlist DEFCON 16

Video thumbnail

Nexus trimester - Omri Weinstein (Courant Institute (NYU)) 2/6

Some Some Information-Theoretic Problems in Theoretical Computer Science - Part II February 04, 2016 Abstract: In this informal talk, I will present and shortly discuss a few long-standing open problems in theoretical computer science (TCS), including Secret-Sharing, Multi-terminal commu

From playlist Nexus Trimester - 2016 - Distributed Computation and Communication Theme

Video thumbnail

Barry Sanders: Spacetime replication of continuous-variable quantum information

Abstract: Combining the relativistic speed limit on transmitting information with linearity and unitarity of quantum mechanics leads to a relativistic extension of the no-cloning principle called spacetime replication of quantum information. We introduce continuous-variable spacetime-repli

From playlist Mathematical Physics

Video thumbnail

NOTACON 9: Collaboration. You keep using that word... (EN) | Enh. audio

Speaker: Angela Harms Sure. You collaborate every day at work, right? Except you don't. Because collaboration is not the same as cooperation. Cooperation is where everybody does their part. Collaboration creates a solution that's more than the sum of those parts. Cooperation helps us cho

From playlist Notacon 9

Related pages

Chinese remainder theorem | George Blakley | Secret sharing using the Chinese remainder theorem | Parallel (geometry) | Group (mathematics) | Polynomial | Dimension | Hyperplane | Homomorphic secret sharing | Erasure code | Information-theoretic security | Information theory | Adversary (cryptography) | Visual cryptography | Bit | Orthogonal array | Shamir's Secret Sharing | Public-key cryptography | Bitwise operation