Stats: 3,172,427 members, 7,884,935 topics. Date: Tuesday, 09 July 2024 at 06:28 PM |
Nairaland Forum / Nairaland / General / Investment / Crypto Currency Investors Thread (3535755 Views)
The Metaverse Investors Thread / NFT Investors Thread / Sh!t Coin Investors Thread (2) (3) (4)
(1) (2) (3) ... (3775) (3776) (3777) (3778) (Reply) (Go Down)
Re: Crypto Currency Investors Thread by AngelSlay: 3:40pm |
What Is Shamir’s Secret Sharing? Shamir's Secret Sharing scheme uses an algorithm in cryptography to safely distribute parts of highly sensitive data among a network or group to prevent unauthorized access to the data. The data is divided into smaller parts called shares which are then distributed into a group or network. This scheme is named after a prominent Israeli cryptographer, Adi Shamir. Shamir's Secret Sharing helps significantly reduce the chances of failing to decrypt the sensitive information distributed on the network. It is due to a feature that allows decryption of the information without needing all the shares. Instead, a number lower than the total number of shares called the threshold is set which greatly reduces the chance of a failure if certain parties of the network are unavailable. Example Let’s assume a company called ABC with 12 members wanting to safeguard a vault using Shamir’s Secret Sharing. The key to the vault is encrypted and is divided into 12 parts, called shares. These shares are then distributed to the members on the network, meaning that the vault would require a certain number of these members to allow access. Now, due to the threshold feature, even if one or two members are not available at a specific time, the vault could still be accessed with the presence of the other members. This helps to mitigate the risk of failing to decrypt the passcode while keeping the vault safe and secure. The Process of Forming Shares Shamir’s Secret Sharing is developed through a complex algebraic algorithm that estimates unknown values in a gap between two points. It is called polynomial interpolation. What this means is that the algorithm encodes the information needed to be encrypted into a polynomial expression. This is basically the dividing phase before distributing it through the network to the members. Instead of requiring all the members, only the threshold number is needed which provides enough data points to correctly estimate the values between the gaps in the encrypted shares. |
Re: Crypto Currency Investors Thread by AngelSlay: 3:40pm |
Low cap projects i am convinced will perform well during the bull run. $OGPU (next solana) $HASHAI $YAI $FUXE $CODEX $SVPN $DEFEND $XEON $ZKLK $LAN $PAAL |
Re: Crypto Currency Investors Thread by AngelSlay: 3:42pm |
AboutMarty:I need it provided you willing to sell at 1250 |
Re: Crypto Currency Investors Thread by iLegendd(m): 5:15pm |
All these coins with poor tokenomics that love to rise faster than others are traps. Celestia has big promises, but the tokenomics suck, so it's a sh!t coin. I shorted and will soon be out. 1 Like 2 Shares
|
(1) (2) (3) ... (3775) (3776) (3777) (3778) (Reply)
Treasury Bills In Nigeria / Nigerian Stock Exchange Market Pick Alerts
Viewing this topic: Buddy0, Agentsalt, shabs15(m), felzylix(m) and 8 guest(s)
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 9 |