ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

Data Security in Proactive Network using Secret Sharing Mechanism

Abstract

For most of the cryptosystems, using a single master key system is not enough to protect important documents, there is a need of many encryption and decryption keys for this purpose. A Secret Sharing Scheme is the method which divides the secret into several parts and distributes them among the specific communicating entities in such a way that only these participants can reconstruct the secret by poling there share. Hence, unauthorised entity cannot reconstruct the secret. The best way to implement such a system is in cloud environment. Shamir’s(t, n) threshold scheme is one of the most well-known and widely used example of secret sharing systems.

Himanshu Gupta, Vasudha Arora

To read the full article Download Full Article