Allen wrote:
> One of the questions that I have been raising is trust and how to ensure
> that that it is not misplaced or eroded over time. Which leads me to my
> question for the list: I can see easily how to do split key for 2 out of
> x for key recovery, but I can't seem to find a reference to the 3 out of
> x problem.
Read Shamir's original paper:
http://www.cs.tau.ac.il/~bchor/Shamir.html
and the Wikipedia page:
http://en.wikipedia.org/wiki/Secret_sharing
--
Ivan Krstić <[EMAIL PROTECTED]> | GPG: 0x147C722D
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]