DocumentCode :
561222
Title :
Study on Secret Sharing Schemes (SSS) and their applications
Author :
Al Ebri, Noura ; Baek, Joonsang ; Yeun, Chan Yeob
Author_Institution :
Inf. Security Res. Group, Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, Saudi Arabia
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
40
Lastpage :
45
Abstract :
Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme (SSS) that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. This paper will study these schemes and explain the need for them and their security. Across the years, various schemes have been presented. This paper will survey some of them varying from trivial schemes to threshold based ones. Explanations on these schemes constructions are presented. The paper will also look at some applications of SSS.
Keywords :
private key cryptography; public key cryptography; encryption key; key management mechanism; password; secret key; secret recipe; secret sharing scheme; Electronic voting; Encryption; Image reconstruction; Polynomials; Protocols; Blakley SSS; SSS applications; Secret splitting; Shamir SSS; Threshold schemes; Verfiable SSS;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location :
Abu Dhabi
Print_ISBN :
978-1-4577-0884-8
Type :
conf
Filename :
6148357
Link To Document :
بازگشت