International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016


Performance Analysis of Various Secret Sharing Techniques

Surbhi Sharma [2] | Pradeep Kumar [46]


Abstract: Various secret sharing schemes have been developed since Shamir proposed secret sharing scheme in 1979 for the application of key distribution. A secret sharing scheme allows a dealer to protect a secret among a set of participants with each participant holding one share. A study is done on multiple secret sharing schemes based on matrix projection and secret sharing scheme for implicit data security. In secret sharing scheme based on matrix projection, secrets are organized in form of square matrix. Data pieces are said to be implicitly secure if no explicit encryption key is used and pieces in themselves do not reveal any information until at least certain number of them brought together. In this paper we analyze both types of secret sharing schemes and at last a secret scheme based on visual cryptography is also discussed.


Keywords: Secret sharing schemes, Shamirs secret sharing scheme, Multiple secret sharing, Space efficient secret sharing


Edition: Volume 5 Issue 1, January 2016,


Pages: 188 - 190


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Surbhi Sharma, Pradeep Kumar, "Performance Analysis of Various Secret Sharing Techniques", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 188-190, https://www.ijsr.net/get_abstract.php?paper_id=NOV152576

Similar Articles with Keyword 'Secret sharing schemes'

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute | Reshma Batule | Shweta Wakalkar | Pooja Shelar

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A | Sinu Maria Kurian

Share this Article
Top