The Single Point of Failure
You have a secret: a master key, a password, nuclear launch codes.
One person holds it. What could go wrong?
- They die unexpectedly
- They get compromised
- They go rogue
- They simply forget
A secret held by one person is a single point of failure.
The Solution: Split It
Secret sharing splits a secret into multiple shares distributed among different people.
- No single person can reconstruct the secret alone
- A minimum number must cooperate (the threshold)
- Below that minimum, nothing is revealed
| Role | Responsibility |
|---|---|
| Dealer | Holds original secret, builds polynomial, distributes shares |
| Players | Each holds one share, must cooperate to reconstruct |
| Combiner | Collects shares, performs interpolation, recovers secret |
The combiner could be one of the players, or a separate trusted party.
Threshold Schemes: (t, n)
A (t, n) threshold scheme splits a secret into shares such that:
- Any or more shares can reconstruct the secret
- Fewer than shares reveal absolutely nothing
Example: A (3, 5) scheme:
- 5 people each get one share
- Any 3 can recover the secret
- Any 2 learn zero information
= threshold (minimum needed), = total shares
The Naive Approach Fails
Why not just split the secret into pieces?
| Secret | Split into |
|---|---|
SECRETKEY | SECR + ETKE + Y |
The problem: Each piece reveals partial information.
With SECR, you’ve already narrowed down possibilities. That’s a leak.
True secret sharing must be all-or-nothing. Below threshold = zero information. Not “less” information.
Shamir’s Secret Sharing
Adi Shamir (the S in RSA) invented this in 1979.
The key insight: A polynomial of degree is uniquely determined by exactly points.
| Polynomial | Degree | Points needed |
|---|---|---|
| Line | 1 | 2 |
| Parabola | 2 | 3 |
| Cubic | 3 | 4 |
| Degree |
With fewer points, infinitely many polynomials fit. You learn nothing about which one is correct.
The Setup
Dealer wants to share secret with:
- Threshold: (minimum shares needed)
- Players: (total shares)
The dealer will build a polynomial where the secret is hidden at .
Step 1: Build a Random Polynomial
The dealer constructs:
- Constant term = the secret
- Other coefficients = random values
- Degree =
The secret sits at . The randomness hides everything else.
Step 2: Generate Shares
The dealer evaluates the polynomial at different points:
| Player | Share |
|---|---|
| Player 1 | |
| Player 2 | |
| Player 3 | |
| … | … |
| Player |
Each player receives one point on the polynomial.
Step 3: Reconstruct the Secret
When players combine their shares:
- They have points on a degree polynomial
- Use Lagrange interpolation to recover the unique polynomial
- Evaluate to get the secret
With exactly points, there’s exactly one polynomial that fits. The secret is determined.
Why Fewer Shares Reveal Nothing
With only points on a degree polynomial:
Infinitely many polynomials pass through those points.
For any possible secret value , there exists a valid polynomial with .
| Points | Possible secrets |
|---|---|
| points | Exactly 1 (determined) |
| points | Infinitely many (any value possible) |
You can’t even narrow down. The secret could literally be anything.
Concrete Example: (2, 3) Scheme
Secret:
Threshold:
Players:
Step 1: Build a degree 1 polynomial (a line):
The coefficient is chosen randomly.
Step 2: Generate shares:
| Player | Calculation | Share |
|---|---|---|
| 1 | ||
| 2 | ||
| 3 |
Step 3: Reconstruction
Any 2 players can find the line through their points and compute .
1 player alone? Infinitely many lines pass through one point. The secret could be any value.
Information-Theoretic Security
This isn’t “computationally hard to break.” It’s impossible.
With shares, every possible secret is equally consistent with your data. No amount of computing power helps.
Unconditional security. Not based on assumptions. Mathematically absolute.
Applications
| Use case | How secret sharing helps |
|---|---|
| Key escrow | Company recovery key split among executives. No single person can access alone. |
| Cloud security | Encryption key shared across servers. Compromise one, learn nothing. |
| Cryptocurrency | Multi-signature wallets. Require 3-of-5 holders to authorize. |
| Nuclear launch | Multiple officers must cooperate. No single person can act alone. |
Key Insight
Secret sharing transforms a single point of failure into distributed trust.
The secret exists nowhere until enough parties cooperate. No single share, no single person, no single server holds the answer.
The whole is recoverable. The parts are useless.