Talk:Shamir's Secret Sharing
From Wikipedia, the free encyclopedia
[edit] Citations
Citations should be available in the paper that this page is about. There is a link to it under "References". Vulturejoe 23:10, 22 May 2007 (UTC)
I removed the notice about improving references. Most of the material in the article stands for itself and there are good references. While it would be very nice with inline references, I do not think we should keep the ugly template at the head of the article. ❝Sverdrup❞ 23:06, 23 January 2008 (UTC)
[edit] Information-theoretic security
Is this how Shamir originally described it, or is it a paraphrase? For example, the method as described appears not to be information theoretic secure. (If polynomial coefficients are restricted to integers, with k = 3, a person who had f(1) and f(2) could determine whether f(0) was even or odd; if they are not restricted to integers, there are possible roundoff errors.) A finite-difference based method seems better; are there any problems with it? Ralphmerridew (talk) 17:14, 19 April 2008 (UTC)
- See this blog post and this reply. -- De Guerre (talk) 07:17, 20 April 2008 (UTC)
-
- So it was a case of the paper being misstated. Good.Ralphmerridew (talk) 10:04, 23 April 2008 (UTC)