Shamir Threshold Based Encryption
This paper Shamir threshold scheme based on the protection of private keys, by constructing a Lagrange interpolating polynomial to achieve in the real environment using the key shared information systems, computation and communication in the case of less , the program can prevent the system key is lost, damaged, and from the enemy's attack, reduce the responsibility of the key holder, but also can reduce the success rate of an adversary to decipher the key. An example is the feasibility of the program.
X. Y. Gan and B. Liu, "Shamir Threshold Based Encryption", Applied Mechanics and Materials, Vols. 52-54, pp. 709-712, 2011