In this paper we present explicit vector formulae for the Lagrange-Newton transformation L: K-n -> K-n and its inverse L-1 with respect to interpolating knots x(i) = alpha x(i-1) + beta (i = 1, 2,.... n - 1 : x(0) = gamma). where alpha not equal 0, beta, gamma belong to a field K. These formulae depend on the wrapped convolution, Horner transformation, iterative product and coordinatewise vector operations. All these transformations and operations, except of O (n log n)-wrapped convolution, have running time of O(n) base operations from the field K. Moreover. we give an application of these fast interpolating transformations to threshold secret sharing schemes in cryptography. (c) 2007 Elsevier Inc. All rights reserved.