Survey of Various Secret Sharing Scheme

Authors

  • Utpal B Patel  Computer Science and Engineering, Parul Institute of Engineering and Technology, Vadodara, Gujarat, India

Keywords:

Cryptography, Secret Sharing Scheme, Proactive, Verifiability, Threshold.

Abstract

A Secret Sharing is a techniques for increasing the security of sensitive information. Secret Sharing is that a secret will be Split into a number of pieces between a numbers of participants. All number of pieces of secret can be merge together to generate the original secret. In nowadays world use of this secret sharing concepts are widely used for protecting sensitive information. Different-Different application use the secret sharing schemes in different ways depending on the demand of the application. This widely use of secret sharing has extended to large research on this subject. In this we have studied different-different secret sharing scheme and classified based on their characteristics.

References

  1. A. Shamir, "How to Share a Secret," ACm, vol. 22, pp. 612,613, 1979.
  2. A. Herzberg, S. jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Springer, 1998.
  3. Subha Rao Y V and Chakravarthy Bhagvati, "CRT Based Threshold Multi Secret Sharing Scheme," Internation Journal of Network Security, vol. 16, pp. 249-255, 2014
  4. Lai Bai, "A Strong Ramp Secret Sharing Scheme Using Matrix Projection," IEEE, 2006.
  5. Lein Harn and Changlu Lin, "Strong (n,t,n) verifiable secret sharing scheme," ScienceDirect, pp. 3059-3064, 2010.
  6. Li Bai and XuKai Zou, "A Proactive Secret Sharing Scheme in matrix projection method," Int.J.Security and Networks, vol. 4, pp. 201-209, 2009
  7. Ernest F.Brickell, "Some Ideal Secret Sharing Schemes," Springer, 1998.
  8. Taihei Watanabe, Keiichi Iwamura and Kitahiro Kaneda, "Secrecy Multiplication Based on a (k,n)-Threshold Secret -Sharing Scheme Using Only k server," Springer, pp. 107-112, 2015.
  9. Maurics Mignotte, "HOW TO SHARE A SECRET," Springer, pp. 371-375, 1983.
  10. Laio-Jun Pang and Yu-Min Wang, "A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing," Elsevier, pp. 840-848, 2005.

Downloads

Published

2016-06-30

Issue

Section

Research Articles

How to Cite

[1]
Utpal B Patel, " Survey of Various Secret Sharing Scheme, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 3, pp.147-151, May-June-2016.