Home > Today’s Crypto News
bitcoin
bitcoin

$105376.947920 USD

3.29%

ethereum
ethereum

$3307.450676 USD

2.02%

xrp
xrp

$3.166034 USD

3.66%

tether
tether

$0.999996 USD

0.13%

solana
solana

$256.011142 USD

8.15%

bnb
bnb

$698.345581 USD

2.71%

dogecoin
dogecoin

$0.366785 USD

7.39%

usd-coin
usd-coin

$1.000137 USD

0.01%

cardano
cardano

$0.997491 USD

2.46%

tron
tron

$0.251575 USD

5.52%

chainlink
chainlink

$25.988166 USD

7.81%

avalanche
avalanche

$36.908167 USD

5.09%

sui
sui

$4.613995 USD

7.12%

stellar
stellar

$0.433275 USD

0.14%

toncoin
toncoin

$5.216493 USD

5.40%

Shamir’s Secret Sharing

What Is Shamir’s Secret Sharing?

Shamir's Secret Sharing scheme uses an algorithm in cryptography to safely distribute parts of highly sensitive data among a network or group to prevent unauthorized access to the data. The data is divided into smaller parts called shares which are then distributed into a group or network. This scheme is named after a prominent Israeli cryptographer, Adi Shamir.

Shamir's Secret Sharing helps significantly reduce the chances of failing to decrypt the sensitive information distributed on the network. It is due to a feature that allows decryption of the information without needing all the shares. Instead, a number lower than the total number of shares called the threshold is set which greatly reduces the chance of a failure if certain parties of the network are unavailable. 

Example

Let’s assume a company called ABC with 12 members wanting to safeguard a vault using Shamir’s Secret Sharing. The key to the vault is encrypted and is divided into 12 parts, called shares. These shares are then distributed to the members on the network, meaning that the vault would require a certain number of these members to allow access. Now, due to the threshold feature, even if one or two members are not available at a specific time, the vault could still be accessed with the presence of the other members. This helps to mitigate the risk of failing to decrypt the passcode while keeping the vault safe and secure.

The Process of Forming Shares

Shamir’s Secret Sharing is developed through a complex algebraic algorithm that estimates unknown values in a gap between two points. It is called polynomial interpolation. What this means is that the algorithm encodes the information needed to be encrypted into a polynomial expression. This is basically the dividing phase before distributing it through the network to the members. Instead of requiring all the members, only the threshold number is needed which provides enough data points to correctly estimate the values between the gaps in the encrypted shares.