Implementasi Secure Multi-Party Computation Menggunakan Metode Shamir Secret Sharing pada Pengamanan Dokumen Digital Rahasia

Main Article Content

Willy Sudiarto Raharjo
Antonius Rachmat C.
Pedro Nadirio A.

Abstract

Keamanan data merupakan aspek penting yang perlu diperhatikan dalam proses penyimpanan data. Pada beberapa situasi, terdapat data rahasia yang hanya boleh diakses apabila terdapat sejumlah pihak yang memiliki hak akses telah memberikan kontribusinya untuk mengakses data rahasia tersebut. Pada publikasi ini, kami mengimplementasikan sebuah sistem pengamanan data berbasis Multi-Party Computation dengan memanfaatkan skema Shamir Secret Sharing. Sistem yang dibangun telah mampu membagi data rahasia menjadi N potongan dan hanya setelah N potongan tersebut digabungkan kembali, data asli bisa didapatkan kembali. Kami juga mampu mengatasi sebuah persoalan integritas data yang belum dapat diatasi oleh Shamir Secret Sharing yaitu dengan memanfaatkan Hashed Key.

 

Kata Kunci: Dokumen Digital Rahasia, Keamanan Data, Skema Shamir Secret Sharing, Multi-Party Computation.

Article Details

How to Cite
Raharjo, W. S., C., A. R., & A., P. N. (2018). Implementasi Secure Multi-Party Computation Menggunakan Metode Shamir Secret Sharing pada Pengamanan Dokumen Digital Rahasia. Jurnal Informatika Dan Sistem Informasi, 4(1), 1–9. Retrieved from https://journal.uc.ac.id/index.php/JUISI/article/view/689
Section
Articles

References

[1] D. Bogdanov, “Foundations and properties of Shamir’s secret sharing scheme” dalam Research Seminar in Cryptography, Mei 2007.

[2] L. Goubin & A. Martinelli, “Protecting AES with Shamir’s Secret Sharing Scheme”, Workshop on Cryptographic Hardware and Embedded Systems, Nara, Jepang September, 2011.

[3] R. Cramer & I. Bjerre Damgard, “Secure Multiparty Computation” dalam “Secure Multiparty Computation and Secret Sharing”, edisi ke-1, Inggris, 2015, bab 1, halaman 6.

[4] A. Shamir, “How to share a secret”, Communications ACM, Vol 22, Issue 11, Halaman 612-613, November 1979.

[5] G. Gnaneshwar, “Color Image Integrity Verification Using Shamir’s Secret Sharing Scheme”, International Journal of Innovative Research & Development, halaman 20-24, Juni, 2014.

[6] A. Al-Adhami, M. Ambroze, & I. Stenget, “A 256 bit implementation of ECC-RFID based system using Shamir Secret sharing scheme and Keccak hash function”, Ubiquitous and Future Networks (ICUFN), Ninth International Conference, 4-7 Juli 2017.

[7] B. V.P, D. G. Nair, A. Sreekumar, “Secret Sharing Homomorphism and Secure E-voting”, Februari 2016.

[8] E. Meijering, “A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proceedings of the IEEE”, halaman 319-342. Agustus 2002.

[9] V. Relan, “Secret Sharing”, September, 2009.

[10] W. G. Horner, “A New Method of Solving Numerical Equations of All Orders, by Continuous Approximation”, Philosophical Transactions of the Royal Society of London, Vol. 109, halaman 308-335, 1819.

[11] Specification for the ADVANCED ENCRYPTION STANDARD (AES), National Institute of Standards and Technology, Springfield, VA, 2001.

[12] F. Kagan Gürkaynak, “GALS System Design: Side Channel Attack Secure Cryptographic Accelerators”, disertasi Ph.D, Dept. of Information Technology and Electrical Engineering, ETH Zurich, Zürich, Switzerland, 2006.

[13] C. Veness, “AES Implementation in PHP” [online], tersedia: http://www.movable-type.co.uk/scripts/aes-php.html.

[14] L. Laszlo, “Javascript QRCode scanner” [online], tersedia: https://github.com/LazarSoft/jsqrcode

[15] J. Mott, “crypto-js” [online], tersedia: https://code.google.com/archive/p/crypto-js/

[16] E. Grey, “FileSaver.js” [online], tersedia: https://github.com/eligrey/FileSaver.js/

[17] T. Tidwell, “jsencrypt” [online], tersedia: https://github.com/travist/jsencrypt

[18] A. Martin & P. Johnston, “Javascript SHA-256” [online], tersedia: http://www.webtoolkit.info/javascript_sha256.html#.WqT14OeYPDd

[19] D. Boneh, “Authenticated encryption” [online], tersedia: https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/slides/07-authenc-v2-annotated.pdf

[20] P. Rogaway, “The Evolution of Authenticated Encryption”, Workshop on Real-World Cryptography, California, Amerika Serikat, Januari, 2013.

[21] M. Tompa & H. Woll, “How to share a secret with cheaters”, Journal of Cryptology, halaman 133-138, 1988.

[22] C.-S. Laih & Y-C. Lee, “V-fairness (t,n) secret sharing scheme”, IEEE Proceedings – Computer and Digital Technique Juli 1997.

[23] W. K. Moses & C. Pandu Rangan, “Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security”, International Journal of Network Security & Its Application, November 2011.

[24] Y. Tian, J. Ma, C. Peng, & J. Zhu, “Secret Sharing Scheme with Fairness”, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference, November 2011.

[25] L. Harn, C. Lin, Y. Li, “Fair Secret reconstruction in (t,n) secret sharing”, Journal of Information Security and Applications, Juli 2015.