Expand description
§Shamir Secret Sharing
This system was explained in a paper by Adi Shamir in 1979: How to Share a Secret.
Shamir Secret Sharing(SSS) is an algorithm for splitting a secret $S$ into a number of shares, $n$, where at least $k$ shares are required to recover the original secret. SSS also has a few nice properties:
- It has information-theoretic security which means that no matter how much computing power adversaries that may want to crack the system have, the system remains secure. This is due to a fundamental fact about the way secrets and shares are generated, explained below.
- Knowledge of any $k - 1$ shares gives no information to the information of the secret, $S$.
- It is extensible, which means the number of shares $n$ can be added or deleted without affecting the existing shares.
- It is dynamic, which means that if one of the shares is compromised, all of the given shares can be recalculated to generate a new polynomial without requiring a change of the secret.
- It is flexible, which means more shares can be given based on some condition, e.g. if one party should have twice as many shares as another party, that can be handled by the system.
The first two principles are most important: no adversary can crack the system without having the $k$ required shares, and anybody without those $k$ shares gets no information about the secret, $S$.
This works by the following principle: Imagine you have a polynomial of degree $n$. You require at least $n + 1$ points to uniquely define the polynomial. If you have $\leq n$ points, there are infinitely many polynomials that could fit the given points, thus you have learned nothing about the secret $S$ and are no more informed than a participant with no information.
Imagine you are trying to recover a line (a polynomial with a degree of 1) from some number of given points, $k$. If $k = 1$, there are infinitely many lines that pass through your given point. Let’s say our 1 point is the y-intercept, and it has a value of 3. How many lines have a y-intercept of 3? Infinitely many, as all of these lines could possibly fit.
$$ y = -\infty..\infty + 3 $$
Thus you’ve learned nothing about the line, since you have to take infinitely many guesses to define the line, which is the same as a participant with no information about the given point.
This works for a polynomial of any degree. If you want to recover a polynomial with degree 2 (a parabola), you’d need 3 points to recover it.
From: https://en.wikipedia.org/wiki/File:3_polynomials_of_degree_2_through_2_points.svg
If we have 3 points for our parabola, however, we can recover the unique polynomial. How we do that is discussed in the next section.
§How it works
Now that we know what we want to do (keep a secret value by encoding it as a polynomial), let’s go over how we do that.
First, there should be some function that takes a secret value, and the number of shares desired and returns a polynomial of the desired degree. In this implementation, we set the secret as the y-intercept and each share is a given $x$ value.
Second, we should have a function that decrypts the points. If the correct $k$ points are passed to this function, the function returns the secret $S$ back. This is done with lagrange polynomial interpolation. For any polynomial of degree $n$, the algorithm defines a polynomial where $x$ is equal to 1 for the given point $k_i$, and 0 for all other points.
Finally, all of the polynomials are multiplied together to recover the original polynomial (the secret polynomial) and its secret value, the y-intercept can be easily found from it.
In visual form:
From: https://en.wikipedia.org/wiki/Lagrange_polynomial#/media/File:Lagrange_polynomial.svg
Note that the black line is the desired polynomial, and the rest are multiplied together to recover the original polynomial and its y-intercept.
In pseudocode that would look like the following:
def interpolate(points: list[(x, y)]) -> number:
let y = 0
for (i, (x_0, y_0)) in enumerate(points):
let l_i = 1
for (j, (x_1, y_1)) in enumerate(points):
if i != j:
l_i *= x_1 / (x_1 - x_0)
y += l_i * y_0
return y
And we get back the y-intercept.
§Pitfalls
However, SSS also has a few pitfalls:
- Given that it is information-theoretically secure, if one or more wrong values are provided, where the number of shares still is $\geq k$, an invalid secret will be returned by the decryption function.
Ideally, we would rather the decryption function tell us which share was incorrect, but there is no way for the function to do so as is. This makes the system attackable indirectly – imagine that of the $k$ parties required, $k-1$ parties are honest and $1$ party is dishonest. The dishonest party could then ask everyone to “reveal” their secret, and also reveal their own phony secret. They would then have information of all the other $k-1$ shares required to recover the secret, and could pair it with their required secret to recover the secret alone. The other $k-1$ members would not be able to find out who was dishonest, since the decryption algorithm gives a successful response but the wrong secret.
Functions§
- This function generates a polynomial with the given secret, passed as bytes.
- This function takes a polynomial and evaluates it. The polynomial is passed in in reverse order: Normally, polynomials are written as $ax^2 + bx + c$, but this function takes the y-intercept first, and then the unknowns, like $c + bx + ax^2$.
- This function performs polynomial interpolation. Given a set of points defined by x and y coordinates, it returns the y-intercept of the unique polynomial that passes through all of the points, with the degree $n - 1$, where $n$ is the number of points passed to the function.
- This function generates a random polynomial for Shamir’s secret sharing. It takes a secret and degree of polynomial to create (the amount of shares) It sets the y-intercept to the secret passed in and then generates as many points as there are shares, and returns the polynomial, with the secret as the first item. Imagine you’re trying to create a polynomial with a degree of 2: In math notation that would look like this: $ ax^2 + bx + c $ Since the y-intercept will be the secret, we can set the secret to $c$. Then, we generate two values, $a$ and $b$, which define the $x^2$ portion of the polynomial and the $x$. Imagine our $a$ is 7, our $b$ is 5 and our secret is 8. The polynomial would look like this: $7x^2 + 5x + 8$. In code, since we populate the values in reverse, that would be:
vec![8, 5, 7]
. - This function attempts to reconstruct a secret from some amount of shares. Given that this function doesn’t know the number of shares required ($k$), it will try to fit a polynomial in any case, thus providing an incorrect secret if there are fewer than $k$ shares provided or at least one of the $k$ provided shares is incorrect.