You can now do Shamir's secret sharing in Hare and use it as a module or just install the CLI.

https://git.sr.ht/~blainsmith/hare-shamir-secret-sharing

Disclaimer: This has not been formerly audited so use at your own risk.

#Cryptography #SecretSharing #HareLang

What is Multi-Party Computation?

We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a series of articles Privacy Guides team member @fria be publishing, covering the privacy-enhancing technologies being rolled out in various products.

https://www.privacyguides.org/articles/2025/09/15/multi-party-computation/

#MultiPartyComputation #Encryption #Security #Privacy #MPC #MentalPoker #SecretSharing #Article #PrivacyGuides

What is Multi-Party Computation?

Learn about Secure Multi-Party Computation and how it can be used to solve real-world privacy problems.

Privacy Guides

@eliasp

Ich habe den Blog-Beitrag über das Problem #DigitalerNachlass bzw. #SecretSharing nochmal etwas überarbeitet.

https://cknoll.github.io/sicherer-digitaler-nachlass-flexible-secret-sharing.html

Mich würde interessieren, was technisch versierte Menschen mit dem für das Thema erforderlichen Weitblick (z.B. @jssfr @HackerGeno @fsfw-dresden.de @bits_und_baeume) dazu sagen.

(Bezug zu Nachhaltigkeit und #BitsUndBaeume ganz unten im Blog-Post.)

blog:cknoll · Sicherer digitaler Nachlass ("flexible secret sharing")

@eliasp @cubicroot @citizenK4te @ueckueck
@tropf

Ich habe über das Problem #DigitalerNachlass nochmal nachgedacht: Ein Programm wie gfshare ist ein Anfang aber für die Praxis zu unflexibel. Soziale Beziehungen ändern sich nunmal und dem sollte das Prinzip #SecretSharing Rechnung tragen.

Ideen (und offene Fragen) dazu hier:

https://cknoll.github.io/sicherer-digitaler-nachlass-flexible-secret-sharing.html

blog:cknoll · Sicherer digitaler Nachlass ("flexible secret sharing")

Reference implementation of Shamir's Secret Sharing

Is there an implementation of Shamir's Secret Sharing that can be regarded as "canonical" (or "reference" or "standard") implementation, so that I can test other

Cryptography Stack Exchange
Solving Shamir secret sharing schemes

I have been working through the introduction to cryptography with coding theory book and have just come across Shamir secret sharing questions. However I just don't quite think I'm understanding it

Cryptography Stack Exchange