As Ben mentioned, who encrypts the file is crucial differentiator. Either
you can accept one party knows contents of the file beforehand, or you need
to solve quite different challenge first — how file content is created in
the encrypted form without either party ever having full plaintext.

If it is acceptable that one party does encryption as the first step, then
indeed *n/n* Shamir schema is the way to go. We did a lot of thinking how
an application for Shamir split/storage/restore of high-value files should
work, you can take a look at our whitepaper
<https://vault12.com/technology/> , section 4 outlines some practical
storage scenarios.

- Max
blog <http://skibinsky.com> | linkedin <http://bit.ly/max-li>

On Thu, Mar 28, 2019 at 5:26 PM david wong <davidwong.cry...@gmail.com>
wrote:

> Shamir sharing scheme to split the key in two. Send your half to the other
> one to let them decrypt it.
>


> On Mar 28, 2019, at 3:36 PM, Ben Laurie <b...@links.org> wrote:
>
> Who encrypted this file?
>
> On Thu, 28 Mar 2019 at 13:48, B Da Bahia <bidaba...@gmail.com> wrote:
>
>> Hello list,
>> I'm looking for a cryptographic algorithm to solve the following problem:
>> Alice and Bob (untrusting partners) want to cooperate to open an
>> encrypted file located at either one's computer. No party should be able to
>> open it without the other party's consent. No trusted third parties are
>> allowed to intervene in the protocol.
>> Could anyone provide useful references to explore?
>> thanks in advance!
>>
>
_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to