Study on Secret Sharing Schemes (SSS) and their applications

Noura Al Ebri, Joonsang Baek, Chan Yeob Yeun

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

37 Scopus citations

Abstract

Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme (SSS) that lets you split your secret into several parts and distribute them among selected parties. The secret can be recovered once these parties collaborate in some way. This paper will study these schemes and explain the need for them and their security. Across the years, various schemes have been presented. This paper will survey some of them varying from trivial schemes to threshold based ones. Explanations on these schemes constructions are presented. The paper will also look at some applications of SSS.

Original languageBritish English
Title of host publication2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Pages40-45
Number of pages6
StatePublished - 2011
Event2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011 - Abu Dhabi, United Arab Emirates
Duration: 11 Dec 201114 Dec 2011

Publication series

Name2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011

Conference

Conference2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period11/12/1114/12/11

Keywords

  • Blakley SSS
  • Secret splitting
  • Shamir SSS
  • SSS applications
  • Threshold schemes
  • Verfiable SSS

Fingerprint

Dive into the research topics of 'Study on Secret Sharing Schemes (SSS) and their applications'. Together they form a unique fingerprint.

Cite this