Abstract
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D . This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
References
5
Referenced
9,773
- Aho , A. , Hopcroft , J. , and Ullman , J . The Design and Analysis of Computer AIgorithms . Addison-Wesley , Reading, Mass ., 1974 . Aho, A., Hopcroft, J., and Ullman, J. The Design and Analysis of Computer AIgorithms. Addison-Wesley, Reading, Mass., 1974. / The Design and Analysis of Computer AIgorithms by Aho A. (1974)
- Blakley , G.R. Safeguarding cryptographic keys . Proc. AFIPS 1979 NCC , Vol. 48 , Arlington, Va. , June 1979 , pp. 313 - 317 . Blakley, G.R. Safeguarding cryptographic keys. Proc. AFIPS 1979 NCC, Vol. 48, Arlington, Va., June 1979, pp. 313-317. / Proc. AFIPS 1979 NCC by Blakley G.R. (1979)
- Knuth , D. The Art of Computer Programming , Vol. 2 : SeminumericalAlgorithms . Addison-Wesley , Reading, Mass ., 1969 . Knuth, D. The Art of Computer Programming, Vol. 2: SeminumericalAlgorithms. Addison-Wesley, Reading, Mass., 1969. / SeminumericalAlgorithms by Knuth D. (1969)
- Liu , C.L. Introduction to Combinatorial Mathematics . McGraw- Hill , New York , 1968 . Liu, C.L. Introduction to Combinatorial Mathematics. McGraw- Hill, New York, 1968. / Introduction to Combinatorial Mathematics by Liu C.L. (1968)
10.1145/359340.359342
Dates
Type | When |
---|---|
Created | 23 years, 1 month ago (July 27, 2002, 7:34 a.m.) |
Deposited | 2 months, 2 weeks ago (June 18, 2025, 6:48 p.m.) |
Indexed | 1 day, 17 hours ago (Sept. 4, 2025, 9:43 a.m.) |
Issued | 45 years, 10 months ago (Nov. 1, 1979) |
Published | 45 years, 10 months ago (Nov. 1, 1979) |
Published Online | 45 years, 10 months ago (Nov. 1, 1979) |
Published Print | 45 years, 10 months ago (Nov. 1, 1979) |
@article{Shamir_1979, title={How to share a secret}, volume={22}, ISSN={1557-7317}, url={http://dx.doi.org/10.1145/359168.359176}, DOI={10.1145/359168.359176}, number={11}, journal={Communications of the ACM}, publisher={Association for Computing Machinery (ACM)}, author={Shamir, Adi}, year={1979}, month=nov, pages={612–613} }