Shamir's Secret Sharing

GPTKB entity

Statements (65)
Predicate Object
gptkbp:instance_of gptkb:streaming_service
gptkbp:applies_to gptkb:servers
gptkbp:based_on Polynomial Interpolation
gptkbp:can_be_used_in gptkb:blockchain_technology
gptkbp:distributes gptkb:Keys
https://www.w3.org/2000/01/rdf-schema#label Shamir's Secret Sharing
gptkbp:invention gptkb:Adi_Shamir
gptkb:1979
gptkbp:is_a gptkb:Cryptographic_Protocol
gptkbp:is_analyzed_in Security Research
Cryptographic Evaluations
gptkbp:is_applicable_to gptkb:security
gptkbp:is_applied_in Secure Transactions
gptkbp:is_based_on Finite Fields
gptkbp:is_cited_in Academic Publications
gptkbp:is_considered_as A Fundamental Concept
A Key Distribution Method
A Method for Secret Sharing
A Secure Method
gptkbp:is_described_as Cryptographic Literature
gptkbp:is_discussed_in Cryptography Courses
gptkbp:is_evaluated_by Security Assessments
gptkbp:is_explored_in Research Papers
Distributed Systems
Cryptographic Research
Cryptographic Applications
Cryptographic Theory
gptkbp:is_implemented_in Various Programming Languages
Various Algorithms
Security Frameworks
Cryptographic Libraries
gptkbp:is_notable_for Threshold Cryptography
gptkbp:is_part_of gptkb:Modern_Cryptography
Secure Communication Protocols
Secure Data Management
Secret Sharing Schemes
Secure Systems
Secure Data Sharing Techniques
gptkbp:is_recognized_as A Pioneering Work
gptkbp:is_recognized_by Computer Science
Information Security
gptkbp:is_recognized_for Robustness
gptkbp:is_related_to Information Theory
Secure Data Sharing
Threshold Schemes
gptkbp:is_supported_by Mathematical Foundations
gptkbp:is_tested_for Security Protocols
Cryptographic Protocols
gptkbp:is_used_by gptkb:organization
gptkbp:is_used_for Key Management
Secure Multi-Party Computation
gptkbp:is_used_in gptkb:Identity_and_Access_Management
Digital Signatures
Secure Voting Systems
Cloud Storage Security
gptkbp:is_utilized_for gptkb:security
Access Control
gptkbp:is_utilized_in Data Encryption
Secure Communications
gptkbp:provides Secret Reconstruction
gptkbp:requires Threshold Scheme
gptkbp:security Collusion Attacks
gptkbp:used_in gptkb:crypt
gptkbp:bfsParent gptkb:Adi_Shamir
gptkbp:bfsLayer 5