On Sat, Oct 03, 2009 at 02:42:14AM -0400, Kevin W. Wall wrote:
> The secret S can then be computed by finding f(0) more or less by
> using Lagrangian interpolation on the t shares, the points (i, Si).
>
> The question that a colleague and I have is there any cryptographic
> purpose of computing t
Kevin W. Wall wrote:
> Hi list...I have a question about Shamir's secret sharing.
>
> According to the _Handbook of Applied Cryptography_
> Shamir’s secret sharing (t,n) threshold scheme works as follows:
>
> SUMMARY: a trusted party distributes shares of a secret S to n users.
> RESULT:
On Oct 3, 2009, at 2:42 AM, Kevin W. Wall wrote:
Hi list...I have a question about Shamir's secret sharing.
According to the _Handbook of Applied Cryptography_
Shamir’s secret sharing (t,n) threshold scheme works as follows:
SUMMARY: a trusted party distributes shares of a secret S to n
u
Kevin W. Wall asks about Shamir sharing:
> The question that a colleague and I have is there any cryptographic
> purpose of computing the independent coefficients over the finite
> field, Zp ?
Yes, you do have to be careful to do that. You want to make sure the
shares don't leak any information ab