How to Share a Secret
URL: https://dl.acm.org/doi/10.1145/359168.359176 Authors: Adi Shamir
Abstract
In this paper we show how to divide data into pieces in such a way that is easily reconstructable from any pieces, but even complete knowledge of pieces reveals absolutely no information about . This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes happen to some of the pieces.
BibTeX
@Inproceedings{EC:Mignotte82,
author = {Maurice Mignotte},
title = {How to Share a Secret?},
pages = {371--375},
editor = {Thomas Beth},
booktitle = {Advances in Cryptology -- {EUROCRYPT}'82},
volume = {149},
series = {Lecture Notes in Computer Science},
address = {Burg Feuerstein, Germany},
month = {mar~29~--~apr~2},
publisher = {Springer Berlin Heidelberg, Germany},
year = {1983},
doi = {10.1007/3-540-39466-4_27},
}