HOW TO SHARE A SECRET

被引:9251
作者
SHAMIR, A
机构
[1] Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge
关键词
cryptography; interpolation; key management;
D O I
10.1145/359168.359176
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces. © 1979, ACM. All rights reserved.
引用
收藏
页码:612 / 613
页数:2
相关论文
共 5 条
[1]  
Aho A. V., 1974, DESIGN ANAL COMPUTER
[2]  
BLAKLEY GR, 1979, 1979 P AFIPS NAT COM, V48, P313
[3]  
Knuth D. E., 1969, ART COMPUTER PROGRAM, V2
[4]  
Liu C. L., 1968, INTRO COMBINATORIAL
[5]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017