Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

How to share a secret

Published: 01 November 1979 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

    References

    [1]
    Aho, A., Hopcroft, J., and Ullman, J. The Design and Analysis of Computer AIgorithms. Addison-Wesley, Reading, Mass., 1974.
    [2]
    Blakley, G.R. Safeguarding cryptographic keys. Proc. AFIPS 1979 NCC, Vol. 48, Arlington, Va., June 1979, pp. 313-317.
    [3]
    Knuth, D. The Art of Computer Programming, Vol. 2: SeminumericalAlgorithms. Addison-Wesley, Reading, Mass., 1969.
    [4]
    Liu, C.L. Introduction to Combinatorial Mathematics. McGraw- Hill, New York, 1968.
    [5]
    Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. A CM 21, 2 (Feb. 1978), 120-126.

    Cited By

    View all
    • (2025)An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storageComputer Standards & Interfaces10.1016/j.csi.2024.10387291(103872)Online publication date: Jan-2025
    • (2024)Efficient secure aggregation for privacy-preserving federated learning based on secret sharingJUSTC10.52396/JUSTC-2022-011654:1(0104)Online publication date: 2024
    • (2024)A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret SharingMathematics10.3390/math1214226212:14(2262)Online publication date: 19-Jul-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 22, Issue 11
    Nov. 1979
    37 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/359168
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1979
    Published in CACM Volume 22, Issue 11

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cryptography
    2. interpolation
    3. key management

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5,064
    • Downloads (Last 6 weeks)418
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storageComputer Standards & Interfaces10.1016/j.csi.2024.10387291(103872)Online publication date: Jan-2025
    • (2024)Efficient secure aggregation for privacy-preserving federated learning based on secret sharingJUSTC10.52396/JUSTC-2022-011654:1(0104)Online publication date: 2024
    • (2024)A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret SharingMathematics10.3390/math1214226212:14(2262)Online publication date: 19-Jul-2024
    • (2024)A Security-Enhanced Federated Learning Scheme Based on Homomorphic Encryption and Secret SharingMathematics10.3390/math1213199312:13(1993)Online publication date: 27-Jun-2024
    • (2024)Key Backup and Recovery for Resilient DID EnvironmentMathematics10.3390/math1206083012:6(830)Online publication date: 12-Mar-2024
    • (2024)Secure Data Sharing in Federated Learning through Blockchain-Based AggregationFuture Internet10.3390/fi1604013316:4(133)Online publication date: 15-Apr-2024
    • (2024)Enhancing Trust in Transactive Energy with Individually Linkable Pseudonymous Trading Using Smart ContractsEnergies10.3390/en1714356817:14(3568)Online publication date: 20-Jul-2024
    • (2024)Reversible Data Hiding in Crypto-Space Images with Polynomial Secret Sharing over Galois FieldElectronics10.3390/electronics1314286013:14(2860)Online publication date: 20-Jul-2024
    • (2024)A Stealthy Communication Model with Blockchain Smart Contract for Bidding SystemsElectronics10.3390/electronics1313252313:13(2523)Online publication date: 27-Jun-2024
    • (2024)Verifiable Additive Homomorphic Secret Sharing with Dynamic Aggregation SupportElectronics10.3390/electronics1312237813:12(2378)Online publication date: 18-Jun-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media