Statements (25)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:crypt
|
| gptkbp:application |
cryptographic key backup
distributed key management secure multi-party computation |
| gptkbp:basedOn |
polynomial interpolation
|
| gptkbp:citation |
gptkb:Shamir,_Adi._'How_to_share_a_secret.'_Communications_of_the_ACM_22.11_(1979):_612-613.
|
| gptkbp:field |
cryptography
|
| gptkbp:introducedIn |
1979
|
| gptkbp:inventedBy |
gptkb:Adi_Shamir
|
| gptkbp:minimumSharesRequired |
k (threshold parameter)
|
| gptkbp:property |
perfect secrecy
information-theoretic security |
| gptkbp:publishedIn |
gptkb:Communications_of_the_ACM
|
| gptkbp:relatedTo |
gptkb:Blakley’s_Secret_Sharing_Scheme
threshold cryptography verifiable secret sharing |
| gptkbp:thresholdScheme |
yes
|
| gptkbp:totalShares |
n (number of participants)
|
| gptkbp:type |
secret sharing scheme
|
| gptkbp:usedIn |
gptkb:cryptocurrency
distributed trust systems password recovery systems |
| gptkbp:bfsParent |
gptkb:Adi_Shamir
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Shamir's Secret Sharing
|