Secret Splitting Scheme: A Review

Download Now
Provided by: International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic: Security
Format: PDF
For protecting sensitive information secret splitting technique is employed, like crypto logic keys. It's wont to give a secret worth to variety of parts-shares-that need to be merging along to induce the first worth. These shares will then lean to individual parties that shield them exploitation customary suggests that, e.g., memorize, store in a very pc or in a very safe. Secret splitting is employed in trendy cryptography to attenuate the risks related to compromised information. Splitting a secret distributes the danger of compromising the worth across many parties.
Download Now

Find By Topic