John_White at dell.com said:
> What about the Star Trek approach . . . .
>> A sensitive piece of data is protected by 5 passwords,
> any 3 of which will allow access.
This is described in _Secret Sharing_, pp 71-72 and 528-531 of Applied
Cryptography by Bruce Schneier.
> Anyone know of a real world implementation of this ?
Apparently, the LaGrange Interpolating Polynomial Scheme, Asmuth-Bloom,
Karnin-Greene-Hellman and some others ;) See the book for more details,
don't know if there's C though!
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!