
Summary: A ``secret sharing system'' permits a secret to be shared among \(n\) trustees in such a way that any \(k\) of them can recover the secret, but any \(k-1\) have complete uncertainty about it. A linear coding scheme for secret sharing is exhibited which subsumes the polynomial interpolation method proposed by Shamir and can also be viewed as a deterministic version of Blakley's probabilistic method. Bounds on the maximum value of \(n\) for a given \(k\) and secret size are derived for any system, linear or nonlinear. The proposed scheme achieves the lower bound which, for practical purposes, differs insignificantly from the upper bound. The scheme may be extended to protect several secrets. Methods to protect against deliberate tampering by any of the trustees are also presented.
linear coding scheme, polynomial interpolation method, deterministic probabilistic method, secret sharing system, Authentication, digital signatures and secret sharing
linear coding scheme, polynomial interpolation method, deterministic probabilistic method, secret sharing system, Authentication, digital signatures and secret sharing
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 462 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 1% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 0.1% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
