Security

A Novel Way of Providing Confidentiality to Shared Secret Key and Authenticate the Shares During Reconstruction

Download Now Free registration required

Executive Summary

If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the other users. So this can protect the important information and also protect the key by sharing. If the key is not shared, then always there may be a threat of key being compromised intentionally or unintentionally.

  • Format: PDF
  • Size: 118.14 KB