• DocumentCode
    3730008
  • Title

    Secret sharing scheme security and performance analysis

  • Author

    Aisha Abdallah;Mazleena Salleh

  • Author_Institution
    Faculty of Computing, Universiti Teknologi Malaysia, Skudai, Johor, Malaysia
  • fYear
    2015
  • Firstpage
    173
  • Lastpage
    180
  • Abstract
    In cryptography, secret sharing is a technique to share a secret among a group of members, each of which holds a portion of the secret. The secret can only be retrieved when a certain number of members combine their shares together, while any combination with fewer shares has no extra information about the secret. There are many secret sharing schemes, and each one achieves a different level of security with different performance and storage requirements. In this paper we analyze the security and performance of three secret schemes which are the most common schemes for information dispersal used within distributed storage systems, namely Shamir´s scheme, Rabin´s IDA and hybrid scheme. Several tests were conducted to understand the fundamental concept of the schemes as well as to explore the security, performance and the capability of the schemes.
  • Keywords
    "Distributed databases","Encryption","Testing","Performance analysis","Computational efficiency"
  • Publisher
    ieee
  • Conference_Titel
    Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), 2015 International Conference on
  • Type

    conf

  • DOI
    10.1109/ICCNEEE.2015.7381357
  • Filename
    7381357