Universiti Teknologi Malaysia Institutional Repository

Secret sharing scheme security and performance analysis

Abdallah, A. and Salleh, M. (2016) Secret sharing scheme security and performance analysis. In: 1st International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering, ICCNEEE 2015, 7-9 Sept 2015, Khartoum, Sudan.

Full text not available from this repository.

Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together, while any combination with fewer shares has no extra information about the secret. There are many secret sharing schemes, and each one achieves a different level of security with different performance and storage requirements. In this paper we analyze the security and performance of three secret schemes which are the most common schemes for information dispersal used within distributed storage systems, namely Shamir's scheme, Rabin's IDA and hybrid scheme. Several tests were conducted to understand the fundamental concept of the schemes as well as to explore the security, performance and the capability of the schemes.

Item Type:Conference or Workshop Item (Paper)
Uncontrolled Keywords:Krawczyk's hybrid sharing scheme, performance, Rabin's IDA, Security, Shamir's secret sharing scheme
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:73466
Deposited By: Mohd Zulaihi Zainudin
Deposited On:23 Nov 2017 05:09
Last Modified:23 Nov 2017 05:09

Repository Staff Only: item control page