Statements (65)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:streaming_service
|
gptkbp:applies_to |
gptkb:servers
|
gptkbp:based_on |
Polynomial Interpolation
|
gptkbp:can_be_used_in |
gptkb:blockchain_technology
|
gptkbp:distributes |
gptkb:Keys
|
https://www.w3.org/2000/01/rdf-schema#label |
Shamir's Secret Sharing
|
gptkbp:invention |
gptkb:Adi_Shamir
gptkb:1979 |
gptkbp:is_a |
gptkb:Cryptographic_Protocol
|
gptkbp:is_analyzed_in |
Security Research
Cryptographic Evaluations |
gptkbp:is_applicable_to |
gptkb:security
|
gptkbp:is_applied_in |
Secure Transactions
|
gptkbp:is_based_on |
Finite Fields
|
gptkbp:is_cited_in |
Academic Publications
|
gptkbp:is_considered_as |
A Fundamental Concept
A Key Distribution Method A Method for Secret Sharing A Secure Method |
gptkbp:is_described_as |
Cryptographic Literature
|
gptkbp:is_discussed_in |
Cryptography Courses
|
gptkbp:is_evaluated_by |
Security Assessments
|
gptkbp:is_explored_in |
Research Papers
Distributed Systems Cryptographic Research Cryptographic Applications Cryptographic Theory |
gptkbp:is_implemented_in |
Various Programming Languages
Various Algorithms Security Frameworks Cryptographic Libraries |
gptkbp:is_notable_for |
Threshold Cryptography
|
gptkbp:is_part_of |
gptkb:Modern_Cryptography
Secure Communication Protocols Secure Data Management Secret Sharing Schemes Secure Systems Secure Data Sharing Techniques |
gptkbp:is_recognized_as |
A Pioneering Work
|
gptkbp:is_recognized_by |
Computer Science
Information Security |
gptkbp:is_recognized_for |
Robustness
|
gptkbp:is_related_to |
Information Theory
Secure Data Sharing Threshold Schemes |
gptkbp:is_supported_by |
Mathematical Foundations
|
gptkbp:is_tested_for |
Security Protocols
Cryptographic Protocols |
gptkbp:is_used_by |
gptkb:organization
|
gptkbp:is_used_for |
Key Management
Secure Multi-Party Computation |
gptkbp:is_used_in |
gptkb:Identity_and_Access_Management
Digital Signatures Secure Voting Systems Cloud Storage Security |
gptkbp:is_utilized_for |
gptkb:security
Access Control |
gptkbp:is_utilized_in |
Data Encryption
Secure Communications |
gptkbp:provides |
Secret Reconstruction
|
gptkbp:requires |
Threshold Scheme
|
gptkbp:security |
Collusion Attacks
|
gptkbp:used_in |
gptkb:crypt
|
gptkbp:bfsParent |
gptkb:Adi_Shamir
|
gptkbp:bfsLayer |
5
|