[144276] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Shamir secret sharing and information theoretic security

daemon@ATHENA.MIT.EDU (Jonathan Katz)
Mon Feb 23 16:23:57 2009

Date: Mon, 23 Feb 2009 15:47:33 -0500 (EST)
From: Jonathan Katz <jkatz@cs.umd.edu>
To: Jerry Leichter <leichter@lrw.com>
cc: sbg@acw.com, "R.A. Hettinga" <rah@shipwright.com>,
        Cryptography <cryptography@metzdowd.com>
In-Reply-To: <0CFC504B-2F09-4AAA-BA80-6BDFA62F880E@lrw.com>

On Feb 23, 2009, at 1:05 PM, sbg@acw.com wrote:
>
> Is it possible that the amount of information that the knowledge of a
> sub-threshold number of Shamir fragments leaks in finite precision setting
> depends on the finite precision implementation?
> 
> For example, if you know 2 of a 3 of 5 splitting and you also know that
> the finite precision setting in which the fragments will be used is IEEE
> 32-bit floating point or GNU bignum can you narrow down the search for the
> key relative to knowing no fragments and nothing about the finite
> precision implementation?

I'm not sure what is the motivation for all this. Shamir's scheme is 
supposed to be done over a finite field (or else, as was previously 
pointed out, there are issues with sampling a uniform element of the 
field). Since we have fields of size 2^k for all k, any bit-string can be 
encoded nicely in a finite field of appropriate size. (And very long 
strings can be broken into shorter chunks, each chunk being shared on its 
own.)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post