How to share a secret

Article Properties
Abstract
Cite
Shamir, Adi. “How to Share a Secret”. Communications of the ACM, vol. 22, no. 11, 1979, pp. 612-3, https://doi.org/10.1145/359168.359176.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612-613. https://doi.org/10.1145/359168.359176
Shamir A. How to share a secret. Communications of the ACM. 1979;22(11):612-3.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Description

Can you share a secret so securely that even partial exposure reveals nothing? This groundbreaking paper introduces a method for dividing data into multiple pieces such that any subset can reconstruct the original, but fewer pieces yield absolutely no information. The technique involves distributing data *D* into *n* pieces, ensuring that *D* is reconstructable from any *k* pieces. Critically, complete knowledge of *k* - 1 pieces reveals absolutely no information about *D*, achieving perfect secrecy. This approach enables the development of robust key management schemes for cryptographic systems. It ensures secure and reliable operation, even if misfortunes destroy half the pieces or security breaches expose all but one of the remaining pieces. The implications of this technique extend to secure data storage and transmission, providing a fundamental tool for cryptographic systems. By ensuring confidentiality even under compromise, this work lays a cornerstone for modern data security practices.

This article, published in Communications of the ACM, is highly relevant to the journal’s focus on computer science, algorithms, and cryptographic systems. It presents a novel and practical solution to the problem of secure data sharing, a key concern for ACM's readership. This paper contributes significantly to the field of cryptographic key management.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled A cryptosystem for multiple communication and was published in 1980. The most recent citation comes from a 2024 study titled A cryptosystem for multiple communication . This article reached its peak citation in 2023 , with 393 citations.It has been cited in 732 different journals, 13% of which are open access. Among related journals, the IEEE Access cited this research the most, with 150 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year