Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/73226
Title: | Analisis dan Implementasi Pembagian Rahasia Menggunakan Skema Ambang Shamir |
Authors: | Guritman, Sugi Ilyas, Muhammad Masykur, Muhamad |
Issue Date: | 2014 |
Abstract: | key is used to keep secret in order not easily accessible by others. The key itself also requires a way to keep it from accessed by someone else. A threshold secret sharing scheme developed by Adi Shamir is one way to keep a secret key. This scheme's objective is to divide a secret key S into n parts, such that S is easily reconstructed from any t parts, but when less than t parts are known there is no information about the secret key can be obtained. This research's objectives are to explain how to share a secret using Shamir's threshold scheme, to analyze the security of Shamir's threshold scheme, and to implement Shamir's threshold secret sharing scheme using Wolfram Mathematica 10. Shamir threshold scheme consists of two stages, namely sharing stage and reconstruction stage. This scheme is computationally secure, since it works on integers modulo p, so that when only t – 1 parts of the secret number are known, it is very difficult to guess the value of S. |
URI: | http://repository.ipb.ac.id/handle/123456789/73226 |
Appears in Collections: | UT - Mathematics |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G14mma.pdf Restricted Access | full text | 801.49 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.