Shamir’s Secret Sharing (SSS) is a cryptographic scheme developed by Adi Shamir in 1979 that allows a secret to be divided into multiple parts, called shares, distributed among participants. The secret can only be reconstructed when a predefined threshold number of shares are combined. Fewer than the threshold reveal no information about the secret, ensuring perfect secrecy.

Core Principle

SSS uses polynomial interpolation over finite fields. The secret is encoded as the constant term of a polynomial of degree , where is the threshold. shares (points on the polynomial) are generated, and any of them can reconstruct the original secret via Lagrange interpolation.

Given a threshold of and total shares:

  • A polynomial of degree is chosen randomly such that
  • points are computed and distributed as shares
  • Any points uniquely determine the polynomial (and thus the secret)
  • Any fewer than points are mathematically insufficient to determine

Key Properties

  • Information-theoretic security: Even with shares, the secret remains completely undetermined. Unlike computational security (which relies on the difficulty of breaking an algorithm), this guarantee holds unconditionally.
  • Minimal: Each share is the same size as the original secret.
  • Extensible and dynamic: Shares can be added or removed without affecting other shares or requiring secret reconstruction.
  • Flexible: Participants can be assigned different numbers of shares based on authority level. A participant holding 3 shares in a (3,5) scheme can reconstruct the secret alone.

Custody vs. Coordination

SSS distributes the custody of a secret: who holds it. This is distinct from distributing authorization to act. When shares are combined and the secret is reconstructed, that full secret necessarily exists in one place (one process, one device) for the duration of the operation.

This reconstruction window is the defining constraint. Compare with Multi-Signature, where no secret ever exists in combined form: keys remain independent and never merge. Multisig distributes authorization; SSS distributes custody.

Threshold Cryptography resolves this tension: it distributes key material like SSS but performs computations cooperatively without ever reassembling the full secret.

Use Cases

  • Cryptocurrency recovery phrases: seed phrases can be split so that no single backup location holds the full key
  • Encryption keys and vault access codes: distribute master key fragments across trustees or hardware devices
  • Password manager master keys: threshold recovery schemes for high-value credentials
  • Multi-party key management: organizational secrets held collectively, requiring quorum agreement to unlock

Limitations

  • No built-in verification: SSS provides no way to detect corrupted or forged shares (this is addressed by Verifiable Secret Sharing, a separate scheme)
  • Single point of failure during operations: the secret must be assembled in full at one location during both splitting and reconstruction, creating a brief window of exposure
  • No authentication: a participant with a valid share cannot prove it is valid without revealing it

References