Secret sharing scheme for collaborative access system

This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with confl...

Full description

Bibliographic Details
Main Authors: Kadir, Rashidah, Maarof, Mohd. Aizaini
Format: Conference or Workshop Item
Language:English
Published: 2000
Subjects:
Online Access:http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf
_version_ 1825910583943233536
author Kadir, Rashidah
Maarof, Mohd. Aizaini
author_facet Kadir, Rashidah
Maarof, Mohd. Aizaini
author_sort Kadir, Rashidah
collection ePrints
description This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with conflicting interest must cooperate. In (q,n) secret sharing, a quorum, q of a group of n users are allowed to access the system by having the quorum reconstruct a secret(key), less than quorum can gain no information. Lost or stolen share still ensure the security of resources.
first_indexed 2024-03-05T18:19:15Z
format Conference or Workshop Item
id utm.eprints-10958
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-03-05T18:19:15Z
publishDate 2000
record_format dspace
spelling utm.eprints-109582017-07-24T04:04:06Z http://eprints.utm.my/10958/ Secret sharing scheme for collaborative access system Kadir, Rashidah Maarof, Mohd. Aizaini QA75 Electronic computers. Computer science This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with conflicting interest must cooperate. In (q,n) secret sharing, a quorum, q of a group of n users are allowed to access the system by having the quorum reconstruct a secret(key), less than quorum can gain no information. Lost or stolen share still ensure the security of resources. 2000-11 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf Kadir, Rashidah and Maarof, Mohd. Aizaini (2000) Secret sharing scheme for collaborative access system. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru.
spellingShingle QA75 Electronic computers. Computer science
Kadir, Rashidah
Maarof, Mohd. Aizaini
Secret sharing scheme for collaborative access system
title Secret sharing scheme for collaborative access system
title_full Secret sharing scheme for collaborative access system
title_fullStr Secret sharing scheme for collaborative access system
title_full_unstemmed Secret sharing scheme for collaborative access system
title_short Secret sharing scheme for collaborative access system
title_sort secret sharing scheme for collaborative access system
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf
work_keys_str_mv AT kadirrashidah secretsharingschemeforcollaborativeaccesssystem
AT maarofmohdaizaini secretsharingschemeforcollaborativeaccesssystem