IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET162341                                                     

Survey of Various Secret Sharing Scheme


Utpal B Patel
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
A Secret Sharing is a techniques for increasing the security of sensitive information. Secret Sharing is that a secret will be Split into a number of pieces between a numbers of participants. All number of pieces of secret can be merge together to generate the original secret. In nowadays world use of this secret sharing concepts are widely used for protecting sensitive information. Different-Different application use the secret sharing schemes in different ways depending on the demand of the application. This widely use of secret sharing has extended to large research on this subject. In this we have studied different-different secret sharing scheme and classified based on their characteristics.

Utpal B Patel

Cryptography, Secret Sharing Scheme, Proactive, Verifiability, Threshold.

  1. A. Shamir, "How to Share a Secret," ACm, vol. 22, pp. 612,613, 1979.
  2. A. Herzberg, S. jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Springer, 1998.
  3. Subha Rao Y V and Chakravarthy Bhagvati, "CRT Based Threshold Multi Secret Sharing Scheme," Internation Journal of Network Security, vol. 16, pp. 249-255, 2014
  4. Lai Bai, "A Strong Ramp Secret Sharing Scheme Using Matrix Projection," IEEE, 2006.
  5. Lein Harn and Changlu Lin, "Strong (n,t,n) verifiable secret sharing scheme," ScienceDirect, pp. 3059-3064, 2010.
  6. Li Bai and XuKai Zou, "A Proactive Secret Sharing Scheme in matrix projection method," Int.J.Security and Networks, vol. 4, pp. 201-209, 2009
  7. Ernest F.Brickell, "Some Ideal Secret Sharing Schemes," Springer, 1998.
  8. Taihei Watanabe, Keiichi Iwamura and Kitahiro Kaneda, "Secrecy Multiplication Based on a (k,n)-Threshold Secret -Sharing Scheme Using Only k server," Springer, pp. 107-112, 2015.
  9. Maurics Mignotte, "HOW TO SHARE A SECRET," Springer, pp. 371-375, 1983.
  10. Laio-Jun Pang and Yu-Min Wang, "A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing," Elsevier, pp. 840-848, 2005.

Publication Details

Published in : Volume 2 | Issue 3 | May-June - 2016
Date of Publication Print ISSN Online ISSN
2016-06-30 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
147-151 IJSRSET162341   Technoscience Academy

Cite This Article

Utpal B Patel, "Survey of Various Secret Sharing Scheme", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.147-151, May-June-2016.
URL : http://ijsrset.com/IJSRSET162341.php