Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Secret sharing
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Limitations== Several secret-sharing schemes are said to be [[Information-theoretic security|information-theoretically secure]] and can be proven to be so, while others give up this ''unconditional security'' for improved efficiency while maintaining enough security to be considered as secure as other common cryptographic primitives. For example, they might allow secrets to be protected by shares with entropy of 128 bits each, since each share would be considered enough to stymie any conceivable present-day adversary, requiring a brute force attack of average size 2<sup>127</sup>. Common to all unconditionally secure secret sharing schemes, there are limitations:{{Citation needed|date=April 2023}} * Each share of the secret must be at least as large as the secret itself. This result is based in [[information theory]], but can be understood intuitively. Given {{nowrap|''t'' β 1}} shares, no information whatsoever can be determined about the secret. Thus, the final share must contain as much information as the secret itself. There is sometimes a workaround for this limitation by first [[Data compression|compressing]] the secret before sharing it, but this is often not possible because many secrets (keys for example) look like high-quality random data and thus are hard to compress. * All secret-sharing schemes use [[random]] [[bit]]s for constructing the shares.{{Citation needed|date=April 2023}} To distribute a one-bit secret shares with a threshold of ''t'' shares, {{nowrap|''t'' β 1}} random bits are needed.{{Citation needed|date=April 2023}} To distribute a secret of ''b'' bits, entropy of {{nowrap|(''t'' β 1) Γ ''b''}} bits is necessary.{{Citation needed|date=April 2023}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)