Loading [a11y]/accessibility-menu.js
Hardware Implementation of Secure Shamir's Secret Sharing Scheme | IEEE Conference Publication | IEEE Xplore

Hardware Implementation of Secure Shamir's Secret Sharing Scheme


Abstract:

Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how t...Show More

Abstract:

Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect the system from cheating and attacks is a big problem. In this paper, we proposed to use robust codes and algebraic manipulation detection (AMD) codes to protect the secret sharing module. Simulation and synthesis results show that the proposed architecture can improve the security level significantly even under strong cheating and attack models with some extra area and timing overheads.
Date of Conference: 09-11 January 2014
Date Added to IEEE Xplore: 06 March 2014
ISBN Information:
Print ISSN: 1530-2059
Conference Location: Miami Beach, FL, USA

Contact IEEE to Subscribe

References

References is not available for this document.