Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Funny thing is, when he suggested splitting the key, I assumed that this is what he had in mind.


Maybe he did! I have no idea. But just in case he didn't, or someone else had the interpretation I had, I just wanted to clarify that a real secret-sharing scheme has some pretty nifty properties.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: