Partial key, key safeguarding, and threshold techniques appear to be another example of similar good ideas springing up in several places at nearly the same time — each with a different name and associated terminology. The use of partial key techniques actually appeared in print first in a technical report [Chaum 79] before the key safeguarding techniques were presented at a conference [Blakley 79], and before the threshold schemes were submitted for publication [Shamir 79]. (In fact the author received comments on the technical report from Shamir, along with a draft of the threshold scheme.)
CITATION STYLE
Chaum, D. (1985). How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 196 LNCS, pp. 481–485). Springer Verlag. https://doi.org/10.1007/3-540-39568-7_40
Mendeley helps you to discover research relevant for your work.