160 Johannes Bl¨omer
secured with several padlocks, one for each member of the committee. Every
member of the committee has the key to one of the padlocks. To open the safe
and publish the document every member has to unlock her padlock, thereby
agreeing to the publication of the document.
With secret sharing we can also guarantee that the document is published
only if all members of the committee approve the publication. To do so, we
secure the safe, not with padlocks that require a key, but instead with a
single combination lock, whose secret combination consists of, say, decimal
digits. The secret combination is divided into several pieces, one piece for each
member of the committee, and every member of the committee gets her own
piece of the secret combination, that is, her own partial secret. If all members
of the committee agree to the publication of the document, they combine their
partial secrets to retrieve the secret combination, open the safe, and publish
the document. The partial secrets of the committee members are like keys for
different padlocks that secure the safe. This example demonstrates how we
can use secret sharing to replace physical keys by secret information.
In addition to sharing the secret combination of a safe, there are many
other applications of secret sharing. In fact, secret sharing is one of the most
important techniques in cryptology, the science of encrypting messages, or,
more generally, the science of securing information against unauthorized access
and modification. If we combine methods to share a secret with public-key
cryptography (see Chap. 16), then we can replace keys as well as safes and locks
by secret information and algorithms. Using such a combination of methods
we can encrypt data in such a way that, like in our example above, documents
can be recovered or decrypted only if all committee members contribute their
shares of the secret. Here the partial secrets are parts of a public key in a
public-key encryption scheme.
A Simple Method to Share a Secret
So far we have not described methods to share a secret. How can we replace
locks and keys by partial secrets, each of which is known to a single committee
member? To discuss the first idea, we return to our document locked in a safe
that is secured by a combination lock with a 50-digit secret combination. Let
us assume that the secret combination is
S = 65497 62526 79759 79230 86739 20671 67416 07104 96409 84628.
Let us also assume that our committee has ten members. Therefore, we want to
partition our secret S into ten partial secrets such that only all ten committee
members together are able to reconstruct the secret S. What about giving each
committee member 5 of the 50 digits of our secret combination S (Fig. 17.1).
You can see immediately that this is not such a great idea. If 9 out of
10 committee members decide that they want to publish the document, they
already know 45 of the 50 digits of the secret combination necessary to open