Secret sharing scheme for collaborative access system
This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with confl...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2000
|
Subjects: | |
Online Access: | http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf |
_version_ | 1825910583943233536 |
---|---|
author | Kadir, Rashidah Maarof, Mohd. Aizaini |
author_facet | Kadir, Rashidah Maarof, Mohd. Aizaini |
author_sort | Kadir, Rashidah |
collection | ePrints |
description | This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with conflicting interest must cooperate. In (q,n) secret sharing, a quorum, q of a group of n users are allowed to access the system by having the quorum reconstruct a secret(key), less than quorum can gain no information. Lost or stolen share still ensure the security of resources. |
first_indexed | 2024-03-05T18:19:15Z |
format | Conference or Workshop Item |
id | utm.eprints-10958 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T18:19:15Z |
publishDate | 2000 |
record_format | dspace |
spelling | utm.eprints-109582017-07-24T04:04:06Z http://eprints.utm.my/10958/ Secret sharing scheme for collaborative access system Kadir, Rashidah Maarof, Mohd. Aizaini QA75 Electronic computers. Computer science This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with conflicting interest must cooperate. In (q,n) secret sharing, a quorum, q of a group of n users are allowed to access the system by having the quorum reconstruct a secret(key), less than quorum can gain no information. Lost or stolen share still ensure the security of resources. 2000-11 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf Kadir, Rashidah and Maarof, Mohd. Aizaini (2000) Secret sharing scheme for collaborative access system. In: National Conference on Telecommunication Technology 2000, 20th - 21st Nov. 2000, Hyatt Regency Hotel, Johor Bahru. |
spellingShingle | QA75 Electronic computers. Computer science Kadir, Rashidah Maarof, Mohd. Aizaini Secret sharing scheme for collaborative access system |
title | Secret sharing scheme for collaborative access system |
title_full | Secret sharing scheme for collaborative access system |
title_fullStr | Secret sharing scheme for collaborative access system |
title_full_unstemmed | Secret sharing scheme for collaborative access system |
title_short | Secret sharing scheme for collaborative access system |
title_sort | secret sharing scheme for collaborative access system |
topic | QA75 Electronic computers. Computer science |
url | http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf |
work_keys_str_mv | AT kadirrashidah secretsharingschemeforcollaborativeaccesssystem AT maarofmohdaizaini secretsharingschemeforcollaborativeaccesssystem |