Member-only story
Notes On Shamir’s Secret Sharing Scheme
Lagrange Interpolation Within Shamir’s Secret Sharing Scheme
Civilizations have relied on methods to protect sensitive information and ensure the proper delegation of authority. One such example is the tiger talisman (虎符, hǔ fú) from ancient China, a military mobilization certificate divided into two halves. The central government kept one half, while the other was issued to a general. Troop mobilization required matching the two halves, ensuring the integrity and authenticity of commands.
This concept of dividing authority to safeguard critical assets echoes in modern cryptographic techniques like Shamir’s Secret Sharing Scheme (SSSS). Just as the tiger talisman safeguarded military power, Shamir’s scheme protects sensitive information, such as encryption keys, by splitting it into multiple pieces. Only when a predefined number of these pieces are combined can the original secret be reconstructed.
SSSS ensures secure distribution of a secret among multiple participants such that a subset of them can recover it, but less than the required number cannot gain any information about the secret.