Professional Documents
Culture Documents
R. Rivest
Editor
H o w to Share a Secret
Adi Shamir
Massachusetts Institute of Technology
In this paper we show how to divide data D into n
pieces in such a way that D is easily reconstructable
from any k pieces, but even complete knowledge of
k - 1 pieces reveals absolutely no information about D.
This technique enables the construction of robust key
management schemes for cryptographic systems that
can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Key Words and Phrases: cryptography, key management, interpolation
CR Categories: 5:39, 5.6
1. Introduction
November 1979
Volume 22
Number 11
D i = q(i) . . . . .
D n = q(n).
References
1. Aho, A., Hopcroft, J., and Ullman, J. The Design and Analysis
o f Computer AIgorithms. Addison-Wesley, Reading, Mass., 1974.
2. Blakley, G.R. Safeguarding cryptographic keys. Proc. AFIPS
1979 NCC, Vol. 48, Arlington, Va., June 1979, pp. 313-317.
3. Knuth, D. The Art o f Computer Programming, Vol. 2:
SeminumericalAlgorithms. Addison-Wesley, Reading, Mass., 1969.
4. Liu, C.L. Introduction to Combinatorial Mathematics. McGrawHill, New York, 1968.
5. Rivest, R., Shamir, A., and Adleman, L. A method for obtaining
digital signatures and public-key cryptosystems. Comm. A CM 21, 2
(Feb. 1978), 120-126.
(1) The size of each piece does not exceed the size of the
original data.
(2) When k is kept fixed, D~ pieces can be dynamically
added or deleted (e.g., when executives join or leave
LThe polynomials can be replaced by any other collection of functions which are easy to evaluate and to interpolate.
613
Communications
of
the ACM
November 1979
Volume 22
Number 11