Re: Question about Shamir secret sharing scheme

2009-10-04 Thread Victor Duchovni
On Sat, Oct 03, 2009 at 02:42:14AM -0400, Kevin W. Wall wrote: > The secret S can then be computed by finding f(0) more or less by > using Lagrangian interpolation on the t shares, the points (i, Si). > > The question that a colleague and I have is there any cryptographic > purpose of computing t

Re: Question about Shamir secret sharing scheme

2009-10-04 Thread David-Sarah Hopwood
Kevin W. Wall wrote: > Hi list...I have a question about Shamir's secret sharing. > > According to the _Handbook of Applied Cryptography_ > Shamir’s secret sharing (t,n) threshold scheme works as follows: > > SUMMARY: a trusted party distributes shares of a secret S to n users. > RESULT:

Re: Question about Shamir secret sharing scheme

2009-10-04 Thread Jerry Leichter
On Oct 3, 2009, at 2:42 AM, Kevin W. Wall wrote: Hi list...I have a question about Shamir's secret sharing. According to the _Handbook of Applied Cryptography_ Shamir’s secret sharing (t,n) threshold scheme works as follows: SUMMARY: a trusted party distributes shares of a secret S to n u

Re: Question about Shamir secret sharing scheme

2009-10-04 Thread "Hal Finney"
Kevin W. Wall asks about Shamir sharing: > The question that a colleague and I have is there any cryptographic > purpose of computing the independent coefficients over the finite > field, Zp ? Yes, you do have to be careful to do that. You want to make sure the shares don't leak any information ab