Skip to content

Commit befa146

Browse files
author
Tu Phan
committed
fix: typo
1 parent 830a505 commit befa146

1 file changed

Lines changed: 5 additions & 3 deletions

File tree

  • src/app/blog/block-based-shamir-secret-sharing

src/app/blog/block-based-shamir-secret-sharing/page.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ Block-based Shamir Secret Sharing (Blocked-based SSS) uses $\mathrm{GF}(2^8)$ as
1111

1212
You have a secret $S$. You want:
1313

14-
Split into $n$ shares
15-
Any $t$ shares can recover $S$
16-
Fewer than $t$ shares reveal nothing
14+
- Split into $n$ shares
15+
- Any $t$ shares can recover $S$
16+
- Fewer than $t$ shares reveal nothing
1717

1818
This is achieved with polynomials over a field.
1919

@@ -100,6 +100,8 @@ $$
100100

101101
, where $s \in \{s_1,\dots,s_k\}$ and $p \in \{p_1,\dots,p_k\}$.
102102

103+
Finally, $S = s_1 \Vert s_2 \Vert ... \Vert s_k$.
104+
103105
## Take-Away
104106

105107
Blocked-based Shamir Secret Sharing represents each secret byte as the constant term of a random polynomial over $\mathrm{GF}(2^8)$; shares are polynomial evaluations, and the secret is recovered by interpolation.

0 commit comments

Comments
 (0)