Secret Sharing: Difference between revisions

From
Jump to navigation Jump to search
Content deleted Content added
Henryk (talk | contribs)
No edit summary
Henryk (talk | contribs)
No edit summary
Line 7: Line 7:


Given any <math>k</math> <math>D_i</math> it is possible to interpolate the polynomial and calculate <math>f(0)</math> which gives the original secret <math>D</math>.
Given any <math>k</math> <math>D_i</math> it is possible to interpolate the polynomial and calculate <math>f(0)</math> which gives the original secret <math>D</math>.

=== Example ===
Let <math>D = 4</math>, <math>k = 3</math>, <math>n = 5</math>, that is: The secret is split into 5 parts of which at least 3 are necessary to reconstruct the secret.

Revision as of 10:44, 1 December 2004

Secret Sharing is used to split a secret (usually a key) into several pieces which are then given to distinct persons so that some of these persons must cooperate to reconstruct the secret.

A Simple Approach

One simple approach to split a secret number D into n pieces D1,D2,,Dn such that any k pieces are sufficient (and necessary) to reconstruct D is using a k1 polynomial.

When splitting the secret a random polynomial f(x)=a0+a1x+a2x++ak1xk1 with a0=D is generated. The Di are calculated as Di=f(i) for i=1,,n.

Given any k Di it is possible to interpolate the polynomial and calculate f(0) which gives the original secret D.

Example

Let D=4, k=3, n=5, that is: The secret is split into 5 parts of which at least 3 are necessary to reconstruct the secret.