2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE) 2015
DOI: 10.1109/iccneee.2015.7381357
|View full text |Cite
|
Sign up to set email alerts
|

Secret sharing scheme security and performance analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Md Kausar Alam et al [15] introduced the uses of multi-cloud and data security, to reduce the security risks and its affect on cloud users by using a Shamir's Secret sharing algorithm. The security and performance of a secret sharing scheme based on storage requirement, the time consumed for splitting and recovering the data analyzed by Aisha Abdallah et al [24]. It also reduces the required capital investment to store the share and ensures the security of each secret's share.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Md Kausar Alam et al [15] introduced the uses of multi-cloud and data security, to reduce the security risks and its affect on cloud users by using a Shamir's Secret sharing algorithm. The security and performance of a secret sharing scheme based on storage requirement, the time consumed for splitting and recovering the data analyzed by Aisha Abdallah et al [24]. It also reduces the required capital investment to store the share and ensures the security of each secret's share.…”
Section: Related Workmentioning
confidence: 99%
“…The number of shares involved in this reconstruction should be at least 85% of n of the secret, while shares with less than t will not reveal any secret. This merging of shares is done with the help of Lagrange's interpolation method [24]. This methodology presents confidentiality, secure key sharing among groups and secure data from unauthorized access of valid insiders within the group.…”
Section: A Mathematical Definitionsmentioning
confidence: 99%
“…Note that, if all secrets share a fixed threshold value, the security of the scheme reduces. In [19]- [21], the main research focuses on the secret and share updates, as well as the addition of new individuals or the deletion of participants, and it does not involve changes in threshold values. In this paper, a verifiable threshold multi-secret sharing scheme with different stages was presented.…”
Section: Introductionmentioning
confidence: 99%