Course contentsShow
Security
Lesson 263 of 3,0526. Advanced and Emerging CryptographyPro lesson

Shamir's Secret Sharing and Polynomial Interpolation

How Shamir's scheme uses polynomial interpolation to split secrets into shares with configurable thresholds.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.