Secret Splitting Scheme: A Review

For protecting sensitive information secret splitting technique is employed, like crypto logic keys. It's wont to give a secret worth to variety of parts-shares-that need to be merging along to induce the first worth. These shares will then lean to individual parties that shield them exploitation customary suggests that, e.g., memorize, store in a very pc or in a very safe. Secret splitting is employed in trendy cryptography to attenuate the risks related to compromised information. Splitting a secret distributes the danger of compromising the worth across many parties.

Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC) Topic: Security Date Added: Apr 2014 Format: PDF

Find By Topic