New: Introducing the world's first secure touchscreen hardware wallets

Shop Now

Up your Web3 game

Ledger Academy Quests

  • Test your knowledge
  • Earn POK NFTs
Play now See all quests

Shamir Secret Sharing Meaning

Oct 16, 2023 | Updated Oct 16, 2023
Shamir Secret Sharing (SSS) is a technique to break private information into smaller fragments to keep the information safe. Reconstructing the entire original data requires a certain amount of these shares.

What is Secret Sharing?

Before we dive deep into Shamir Secret Sharing, let’s understand the Secret Sharing concept. Secret Sharing in cryptography is the technique of splitting private information (a secret) into smaller fragments or parts and distributing those parts across a group or network. Individually, the shares are useless. It ensures that no single entity can use their share to access the complete secret. This makes it effective for securing confidential or sensitive information such as private keys, personal data, and more.

Imagine you want to share the password to your safety deposit box with your heirs – Gigi, Ogee, and Georgie. However, you want to ensure that they all need to cooperate to reconstruct the password. You also don’t want any or all of them to know the complete password.

Assuming that the password is “pygmalion”, you could divide it into three parts randomly and share it with your heirs. For instance;

pyg___, _mal___,_ion

In scenarios where the shareholders cannot be completely trusted, the shares are encrypted before they are distributed. If one of the shares is compromised or lost, it’s difficult to reassemble all the shares to reconstruct the secret. This is where Shamir Secret Sharing(SSS) comes in.

Shamir Secret Sharing (SSS) Explained

Shamir Secret Sharing scheme, formulated by Adi Shamir in 1979, is an algorithm that enables a secret to be divided into multiple, distinct parts, but it only requires a certain threshold of the shares to reconstruct the entire secret. The shares are encrypted before they’re distributed in a group or network. No shareholder knows other participants’ encrypted shares.

Using the example above, you could decide on a threshold (say 2 of 3), which is the minimum number of shareholders required for the reconstruction. If Ogee forgot or lost his share of the password, Gigi and Georgie could combine their shares to reconstruct the password. This means that anything short of the threshold cannot reconstruct the original secret. With SSS, a higher threshold typically means there’s a higher level of security.

How does SSS Allow Reconstruction With Only a Fraction of the Shares?

SSS uses a method known as polynomial interpolation, which is a mathematical technique to find unknown data using known data points. This enables the complete reconstruction of a secret with a predetermined minimum number of data points.

BUIDL

The term “BUIDL” is a call for crypto users and enthusiasts to build and contribute to the progress of the blockchain and crypto space, as opposed to passively holding digital assets.

Full definition

Custodian

A custodian is an entity that keeps an individual’s assets safe on their behalf.

Full definition

Design Flaw Attack

A design flaw attack is a cyberattack where hackers use corrupted software to access a user’s cryptocurrency asset.

Full definition