Penerapan Algoritma “LaGrange Interpolating Polynomial” pada Secret Sharing

Lisa Chandra, Yohana Dewi Lulu W, Memen Akbar

Abstract


PIN (Personal Identification Number) is one of the data that is secrecy and important. Therefore,
it is needed technic for keep the secrecy of the data by convert the data from a readable state to apparent
nonsense. This technic is called cryptography. One of the cryptography methods is secret sharing. This
paper will explain how LaGrange Interpolation Polynomial Scheme works on secret sharing. This method
share a secret data, become some parts that call share (fraction of the secret data) to be shared to people
that call participants which being believed to have a right to keep that part of secret. Shares will being
bundle again to create the secret data by using certain methods. By using this application, PIN can be
share securely by an expeditious system. Besides, PIN also more secure in the distribution process
because the single shares that made by this application does not contain the PIN information itself. From
the research and comparable, the application that made is appropriate with the base concept of secret
sharing, which there is a threshold that needed to bundle the PIN and if input shares is less than the
definite threshold, the PIN can’t be decrypted.
Keywords: Secret sharing, Shares, LaGrange Interpolation Polynomial, Cryptography.

Full Text:

PDF

References


Handaka, Michell Setyawati. Studi dan Analisis Skema Benaloh untuk Pembagian Rahasia dengan

Verifikasi beserta Studi dan Implementasi Skema Ambang Shamir. Sekolah Teknik Elektro dan

Informatika ITB; 2011

Kristanto, Yoseph. Studi dan Implementasi Protokol Secret Sharing dengan Algoritma Multiple

Threshold Changeable: Miskroskil Medan.2010

Munir, Rinaldi. Skema Pembagian Data Rahasia. Teknik Informatika ITB; (t,t)

Saputra, Dimas Gilang. Aplikasi Chinese Remainder Theorem dalam Secret Sharing. Institut

Teknologi Bandung;2010

Syahroni, Zainul Gufron, dkk. Secret Sharing Schemes. Universitas Jember;2011

Theodore, Robertus. Implementasi Pembagian Rahasia dengan Menggunakan Teorema Chinese

Remainder. Teknik Informatika ITB. 2011

Zhenjun, Ye. Design and realization of threshold secret sharing scheme with random weights. Journal

of Systems Engineering and Electornics. 2009


Refbacks

  • There are currently no refbacks.


FAKULTAS SAINS DAN TEKNOLOGI
UIN SUSKA RIAU

Kampus Raja Ali Haji
Gedung Fakultas Sains & Teknologi UIN Suska Riau
Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293
Email: sntiki@uin-suska.ac.id