lua-users home
lua-l archive

[Date Prev][Date Next][Thread Prev][Thread Next] [Date Index] [Thread Index]


Probably information-theoretically secure, as opposed to computationally secure.

Shamir's scheme is I-T secure assuming your RNG is truly random.



On Tue, Jan 24, 2012 at 4:09 PM, Phil Bewig <pbewig@gmail.com> wrote:
I don't know what you mean by "perfect."


On Tue, Jan 24, 2012 at 6:05 PM, sergei karhof <karhof21@gmail.com> wrote:
Thanks, Phil.

Is this implementation a perfect scheme? I know that Shamir's scheme
*is* a perfect scheme, but some of its implementations aren't, that's
why I am asking.



On Wed, Jan 25, 2012 at 12:39 AM, Phil Bewig <pbewig@gmail.com> wrote:
> It's Python, not Lua, but I have an implementation of Shamir's
> secret-sharing scheme at my
> blog: http://programmingpraxis.com/2011/06/17/adi-shamirs-threshold-scheme/.
>
> On Tue, Jan 24, 2012 at 4:47 PM, sergei karhof <karhof21@gmail.com> wrote:
>>
>> I am looking for a secret sharing implementation in Lua, possibly
>> Shamir's scheme. Anyone?
>> Thanks
>>
>> --Sergei
>>
>





--