Can you explain more about how this relates to alleviating the problem? I’m curious and admittedly, when I read “crypto”, I think of big tech grifters, but I know that’s not all of cryptography as a field.
Cryptocurrency has forever ruined “crypto” :(
But in any case, m-of-n cryptography (Shamir Secret Sharing) permits “m” keys out of a total “n” keys to unlock a secret, such as the login credentials for a domain registrar. So long as “m” keys are available, the login credentials can be recovered. This avoids having a single point of failure, for example, where only one person knows the login credentials and is AWOL. So long as “m” other folks are still around and active, they can recover the login credentials without the AWOL person.
Cryptocurrency has forever ruined “crypto” :(
But in any case, m-of-n cryptography (Shamir Secret Sharing) permits “m” keys out of a total “n” keys to unlock a secret, such as the login credentials for a domain registrar. So long as “m” keys are available, the login credentials can be recovered. This avoids having a single point of failure, for example, where only one person knows the login credentials and is AWOL. So long as “m” other folks are still around and active, they can recover the login credentials without the AWOL person.
Oh interesting, that makes sense. Thanks for the explanation!