Close Menu
Crypto Chain Post
    Trending

    Former Ripple Exec Follows Michael Saylor’s Bitcoin Playbook

    June 7, 2025

    Ripple USD (RLUSD) Volume Down 57%, Bigger Threat to XRP?

    June 7, 2025

    Hyperliquid coin forms bullish pennant as momentum builds: is a breakout imminent?

    June 7, 2025

    Spot Ether ETFs ongoing inflow streak has hit $812.2M inflows

    June 7, 2025

    Brazil Defies Trump Tariff Threats, Backs Dollar-Free BRICS Trade

    June 7, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Saturday, June 7
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Shamir’s Secret Sharing

    Shamir’s Secret Sharing

    News RoomBy News RoomDecember 30, 2022No Comments2 Mins Read

    Shamir’s Secret Sharing is a scheme to securely share highly sensitive information such as encryption keys by splitting the information into multiple parts called shares.

    Shamir’s Secret Sharing scheme uses an algorithm in cryptography to safely distribute parts of highly sensitive data among a network or group to prevent unauthorized access to the data. The data is divided into smaller parts called shares which are then distributed into a group or network. This scheme is named after a prominent Israeli cryptographer, Adi Shamir.
    Shamir’s Secret Sharing helps significantly reduce the chances of failing to decrypt the sensitive information distributed on the network. It is due to a feature that allows decryption of the information without needing all the shares. Instead, a number lower than the total number of shares called the threshold is set which greatly reduces the chance of a failure if certain parties of the network are unavailable. 

    Let’s assume a company called ABC with 12 members wanting to safeguard a vault using Shamir’s Secret Sharing. The key to the vault is encrypted and is divided into 12 parts, called shares. These shares are then distributed to the members on the network, meaning that the vault would require a certain number of these members to allow access. Now, due to the threshold feature, even if one or two members are not available at a specific time, the vault could still be accessed with the presence of the other members. This helps to mitigate the risk of failing to decrypt the passcode while keeping the vault safe and secure.

    Shamir’s Secret Sharing is developed through a complex algebraic algorithm that estimates unknown values in a gap between two points. It is called polynomial interpolation. What this means is that the algorithm encodes the information needed to be encrypted into a polynomial expression. This is basically the dividing phase before distributing it through the network to the members. Instead of requiring all the members, only the threshold number is needed which provides enough data points to correctly estimate the values between the gaps in the encrypted shares.

    Back to Glossary Index Page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Ripple USD (RLUSD) Volume Down 57%, Bigger Threat to XRP?

    June 7, 2025

    Hyperliquid coin forms bullish pennant as momentum builds: is a breakout imminent?

    June 7, 2025

    Spot Ether ETFs ongoing inflow streak has hit $812.2M inflows

    June 7, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.