#secret-sharing #finite-fields #shamir #field #verifiable #prime

shamir_secret_sharing

A rust implementation of Shamir Secret Sharing over Finite Field

2 releases

0.1.1 Apr 2, 2020
0.1.0 Apr 2, 2020

#12 in #shamir

Download history 12/week @ 2024-09-18 30/week @ 2024-09-25 72/week @ 2024-10-02 23/week @ 2024-10-09 11/week @ 2024-10-16 11/week @ 2024-10-23 1/week @ 2024-11-06 7/week @ 2024-11-13 108/week @ 2024-11-20 201/week @ 2024-11-27 239/week @ 2024-12-04 86/week @ 2024-12-11 64/week @ 2024-12-18 74/week @ 2024-12-25 173/week @ 2025-01-01

424 downloads per month

MIT license

11KB
155 lines

Shamir Secret Sharing(Rust)

Intro

A rust implementation of Shamir Secret Sharing over Finite Field.

The lib support large field charactirics prime by taking advantage of num_bigint .

It's not optimized for production purpose, which can be improved in several aspects:

  • replace the extended_euclid_algo with machine-friendly stein_algo when calculate the modulo inverse

  • add commitment scheme to make it verifiable

Example

use shamir_secret_sharing::ShamirSecretSharing as SSS;
use num_bigint::{BigInt, BigUint};
use num_bigint::Sign::*;
fn main() {
let sss = SSS {
    threshold: 3,
    share_amount: 5,
    prime: BigInt::parse_bytes(b"fffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f",16).unwrap()
    };

let secret = BigInt::parse_bytes(b"ffffffffffffffffffffffffffffffffffffff", 16).unwrap();

let shares = sss.split(secret.clone());

println!("shares: {:?}", shares);
assert_eq!(secret, sss.recover(&shares[0..sss.threshold as usize]));
}

Dependencies

~0.8–1.1MB
~20K SLoC