SECRET SHARING SCHEME VIA SKEW POLYNOMIAL

This research explores advanced techniques in cryptographic security, focusing on secret sharing schemes based on non-commutative algebraic structures. A secret sharing scheme divides a secret into multiple parts, reconstructable from a sufficient number of pieces, exemplified by Shamir’s secret...

Full description

Saved in:
Bibliographic Details
Main Author: Rasikh, Muhammad
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/81916
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:This research explores advanced techniques in cryptographic security, focusing on secret sharing schemes based on non-commutative algebraic structures. A secret sharing scheme divides a secret into multiple parts, reconstructable from a sufficient number of pieces, exemplified by Shamir’s secret sharing scheme. The method described divides data S into r pieces, reconstructable from any r pieces, while r ????1 pieces reveal no information, enhancing key management security even under severe breaches. Additionally, cryptosystems utilizing skew polynomials over finite fields have gained attention for their complexity and potential security benefits. Skew polynomials generalize polynomials over commutative rings, promising a more secure platform. Introduced by Ore in 1933 and further studied by Lam and Leroy, skew polynomial rings leverage complex evaluation and interpolation processes to enhance security. This approach can be viewed as a generalization of Shamir’s secret sharing scheme, offering a robust and secure cryptographic framework.