1. You need all the shards of the key to decrypt the text instead of just reaching a threshold.
2. The full encrypted text is available to each person, making it vulnerable to a brute force attack at some point in the far future.
I'm not entirely sure if this implementation actually covers that second point though. It could be including the entire encrypted text with each copy. But it would theoretically be possible to protect against brute force attacks in that way.
On the first point, just give each person n-1 shards, each missing a different one. Then any 2 can decrypt. Or configure it for however many participants there are and they minimum number needed to encrypt.
armada651|2 years ago
2. The full encrypted text is available to each person, making it vulnerable to a brute force attack at some point in the far future.
I'm not entirely sure if this implementation actually covers that second point though. It could be including the entire encrypted text with each copy. But it would theoretically be possible to protect against brute force attacks in that way.
marzell|2 years ago
On the first point, just give each person n-1 shards, each missing a different one. Then any 2 can decrypt. Or configure it for however many participants there are and they minimum number needed to encrypt.