Statements (25)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:crypt | 
| gptkbp:application | cryptographic key backup distributed key management secure multi-party computation | 
| gptkbp:basedOn | polynomial interpolation | 
| gptkbp:citation | gptkb:Shamir,_Adi._'How_to_share_a_secret.'_Communications_of_the_ACM_22.11_(1979):_612-613. | 
| gptkbp:field | cryptography | 
| gptkbp:introducedIn | 1979 | 
| gptkbp:inventedBy | gptkb:Adi_Shamir | 
| gptkbp:minimumSharesRequired | k (threshold parameter) | 
| gptkbp:property | perfect secrecy information-theoretic security | 
| gptkbp:publishedIn | gptkb:Communications_of_the_ACM | 
| gptkbp:relatedTo | gptkb:Blakley’s_Secret_Sharing_Scheme threshold cryptography verifiable secret sharing | 
| gptkbp:thresholdScheme | yes | 
| gptkbp:totalShares | n (number of participants) | 
| gptkbp:type | secret sharing scheme | 
| gptkbp:usedIn | gptkb:cryptocurrency distributed trust systems password recovery systems | 
| gptkbp:bfsParent | gptkb:Adi_Shamir | 
| gptkbp:bfsLayer | 5 | 
| https://www.w3.org/2000/01/rdf-schema#label | Shamir's Secret Sharing |