Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/73226
Title: Analisis dan Implementasi Pembagian Rahasia Menggunakan Skema Ambang Shamir
Authors: Guritman, Sugi
Ilyas, Muhammad
Masykur, Muhamad
Issue Date: 2014
Abstract: key is used to keep secret in order not easily accessible by others. The key itself also requires a way to keep it from accessed by someone else. A threshold secret sharing scheme developed by Adi Shamir is one way to keep a secret key. This scheme's objective is to divide a secret key S into n parts, such that S is easily reconstructed from any t parts, but when less than t parts are known there is no information about the secret key can be obtained. This research's objectives are to explain how to share a secret using Shamir's threshold scheme, to analyze the security of Shamir's threshold scheme, and to implement Shamir's threshold secret sharing scheme using Wolfram Mathematica 10. Shamir threshold scheme consists of two stages, namely sharing stage and reconstruction stage. This scheme is computationally secure, since it works on integers modulo p, so that when only t – 1 parts of the secret number are known, it is very difficult to guess the value of S.
URI: http://repository.ipb.ac.id/handle/123456789/73226
Appears in Collections:UT - Mathematics

Files in This Item:
File Description SizeFormat 
G14mma.pdf
  Restricted Access
full text801.49 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.