Photo by Kristina Flour on Unsplash

Blakley Secret Sharing

--

If you want to find out about other secret sharing methods using Shamir’s Secret Shares and with Chinese Remainder Theory, click here.

With secret sharing, we distribute n secret shares and then define that t of these shares can rebuild a secret. The value of t is known as the threshold. In this article I will use the example here. Blakley wrote about the method in 1979 [1]:

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.