Talk:Shamir's Secret Sharing

From Wikipedia, the free encyclopedia

[edit] Citations

Citations should be available in the paper that this page is about. There is a link to it under "References". Vulturejoe 23:10, 22 May 2007 (UTC)

I removed the notice about improving references. Most of the material in the article stands for itself and there are good references. While it would be very nice with inline references, I do not think we should keep the ugly template at the head of the article. Sverdrup❞ 23:06, 23 January 2008 (UTC)

[edit] Information-theoretic security

Is this how Shamir originally described it, or is it a paraphrase? For example, the method as described appears not to be information theoretic secure. (If polynomial coefficients are restricted to integers, with k = 3, a person who had f(1) and f(2) could determine whether f(0) was even or odd; if they are not restricted to integers, there are possible roundoff errors.) A finite-difference based method seems better; are there any problems with it? Ralphmerridew (talk) 17:14, 19 April 2008 (UTC)

See this blog post and this reply. -- De Guerre (talk) 07:17, 20 April 2008 (UTC)
So it was a case of the paper being misstated. Good.Ralphmerridew (talk) 10:04, 23 April 2008 (UTC)
It's not that misleading, when you consider that it's only an example to give the idea of the method. The example is correct, it's just that the method isn't information-theoretically secure when you use a field of characteristic zero. -- De Guerre (talk) 12:20, 25 April 2008 (UTC)