Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014
Study of Secret Sharing Schemes Using Access Structure
Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar
Secret sharing schemes (SSS) are used to distribute a highly sensitive secret among a group of individuals so that only when an authorized group of them come together can the secret be reconstructed. The set of these authorized groups is called the access structure. In the outline of threshold schemes, we wanted out of n participants to be able to determine the key. In practice, it is often needed to specify exactly which subset of participants should be able to determine the key and those that should not. The access structure describes all the authorized subsets to design the access structure with required capabilities. In this paper, we have proposed a novel secret sharing scheme with General access structures that is based on the Key-Lock-Pair mechanism. In this paper, associated with each access or is only a key, and associated with each resource is only a lock, and through simple operations on the keys and locks, privacy decisions of the protection system can be revealed. The different qualified subset of participants can cooperate to reconstruct the shared secret, and no unqualified participants can reconstruct the corresponding shared secret.
Keywords: General Access Structure, Secret sharing, Threshold Scheme, KeLock Pair Mechanism, Qualified subset, Forbidden subset
Edition: Volume 3 Issue 4, April 2014
Pages: 751 - 753
How to Cite this Article?
Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar, "Study of Secret Sharing Schemes Using Access Structure", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131573, Volume 3 Issue 4, April 2014, 751 - 753
100 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'Secret sharing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3220 - 3224Verifiable Secure Secret Image Sharing Scheme
Angel Rose A, Sinu Maria Kurian
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2433 - 2435Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image
Priya K. Rahangdale, A. N. Jaiswal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi