International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 309

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014 | Popularity: 6.4 / 10


     

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar


Abstract: Secret sharing schemes (SSS) are used to distribute a highly sensitive secret among a group of individuals so that only when an authorized group of them come together can the secret be reconstructed. The set of these authorized groups is called the access structure. In the outline of threshold schemes, we wanted out of n participants to be able to determine the key. In practice, it is often needed to specify exactly which subset of participants should be able to determine the key and those that should not. The access structure describes all the authorized subsets to design the access structure with required capabilities. In this paper, we have proposed a novel secret sharing scheme with General access structures that is based on the Key-Lock-Pair mechanism. In this paper, associated with each access or is only a key, and associated with each resource is only a lock, and through simple operations on the keys and locks, privacy decisions of the protection system can be revealed. The different qualified subset of participants can cooperate to reconstruct the shared secret, and no unqualified participants can reconstruct the corresponding shared secret.


Keywords: General Access Structure, Secret sharing, Threshold Scheme, KeLock Pair Mechanism, Qualified subset, Forbidden subset


Edition: Volume 3 Issue 4, April 2014


Pages: 751 - 753



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar, "Study of Secret Sharing Schemes Using Access Structure", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 751-753, https://www.ijsr.net/getabstract.php?paperid=20131573, DOI: https://www.doi.org/10.21275/20131573



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 104

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2433 - 2435

Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image

Priya K. Rahangdale, A. N. Jaiswal

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article
Top