Analisis dan Implementasi Pembagian Rahasia Menggunakan Skema Ambang Shamir
View/ Open
Date
2014Author
Masykur, Muhamad
Guritman, Sugi
Ilyas, Muhammad
Metadata
Show full item recordAbstract
key is used to keep secret in order not easily accessible by others. The key itself also requires a way to keep it from accessed by someone else. A threshold secret sharing scheme developed by Adi Shamir is one way to keep a secret key. This scheme's objective is to divide a secret key S into n parts, such that S is easily reconstructed from any t parts, but when less than t parts are known there is no information about the secret key can be obtained. This research's objectives are to explain how to share a secret using Shamir's threshold scheme, to analyze the security of Shamir's threshold scheme, and to implement Shamir's threshold secret sharing scheme using Wolfram Mathematica 10. Shamir threshold scheme consists of two stages, namely sharing stage and reconstruction stage. This scheme is computationally secure, since it works on integers modulo p, so that when only t – 1 parts of the secret number are known, it is very difficult to guess the value of S.
Collections
- UT - Mathematics [1435]