Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Hi-index | 0.00 |
Shamir's method has been examined in the present enouncement as one of the most commented methods in secret sharing. Different properties and possibilities of the method have been analyzed in reconstructing the secret. The method of shared storage and reconstruction of secret information on the basis of the linear correcting codes has been suggested. By using the properties of the processes encoding and decoding with linear codes, part of the disadvantages in Shamir's secret sharing scheme has been removed in the present enouncement.