International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014


Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute | Reshma Batule | Shweta Wakalkar | Pooja Shelar


Abstract: Secret sharing schemes (SSS) are used to distribute a highly sensitive secret among a group of individuals so that only when an authorized group of them come together can the secret be reconstructed. The set of these authorized groups is called the access structure. In the outline of threshold schemes, we wanted out of n participants to be able to determine the key. In practice, it is often needed to specify exactly which subset of participants should be able to determine the key and those that should not. The access structure describes all the authorized subsets to design the access structure with required capabilities. In this paper, we have proposed a novel secret sharing scheme with General access structures that is based on the Key-Lock-Pair mechanism. In this paper, associated with each access or is only a key, and associated with each resource is only a lock, and through simple operations on the keys and locks, privacy decisions of the protection system can be revealed. The different qualified subset of participants can cooperate to reconstruct the shared secret, and no unqualified participants can reconstruct the corresponding shared secret.


Keywords: General Access Structure, Secret sharing, Threshold Scheme, KeLock Pair Mechanism, Qualified subset, Forbidden subset


Edition: Volume 3 Issue 4, April 2014,


Pages: 751 - 753


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar, "Study of Secret Sharing Schemes Using Access Structure", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 751-753, https://www.ijsr.net/get_abstract.php?paper_id=20131573

Similar Articles with Keyword 'Secret sharing'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D | Revathi.M [3]

Share this Article
Top