Study of Secret Sharing Schemes Using Access Structure
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Secret sharing schemes (SSS) are used to distribute a highly sensitive secret among a group of individuals so that only when an authorized group of them come together can the secret be reconstructed. The set of these authorized groups is called the access structure. In the outline of threshold schemes, we wanted out of n participants to be able to determine the key. In practice, it is often needed to specify exactly which subset of participants should be able to determine the key and those that should not. The access structure describes all the authorized subsets to design the access structure with required capabilities. In this paper, we have proposed a novel secret sharing scheme with General access structures that is based on the Key-Lock-Pair mechanism. In this paper, associated with each access or is only a key, and associated with each resource is only a lock, and through simple operations on the keys and locks, privacy decisions of the protection system can be revealed. The different qualified subset of participants can cooperate to reconstruct the shared secret, and no unqualified participants can reconstruct the corresponding shared secret.

Keywords: General Access Structure, Secret sharing, Threshold Scheme, KeLock Pair Mechanism, Qualified subset, Forbidden subset

Edition: Volume 3 Issue 4, April 2014

Pages: 751 - 753

Share this Article

How to Cite this Article?

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar, "Study of Secret Sharing Schemes Using Access Structure", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131573, Volume 3 Issue 4, April 2014, 751 - 753

100 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Secret sharing'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A, Sinu Maria Kurian

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2433 - 2435

Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image

Priya K. Rahangdale, A. N. Jaiswal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article
Top