Secret Sharing: Secure Password Sharing Technique

被引:0
|
作者
Vyas, Hardik A. [1 ]
机构
[1] Uka Tarsadia Univ, Shrimad Rajchandra Inst Management & Comp Applica, Maliba Campus,Bardoli Mahuva Rd, Surat, Gujarat, India
关键词
Secret Sharing; information security; confidentiality; password authentication;
D O I
10.1109/CSNT.2015.74
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is the age of Information and Communication Technology. Day-by-Day new technologies are emerging. With the evolution of new technologies, confidential and secret information are also increasing. If this critical information is to be shared then it becomes very difficult to share this secure and confidential information. In this paper, concentration is done on developing an algorithm to share Password securely using Secret Sharing technique. A Secret sharing technique starts with a secret and then derives from it certain shares which are distributed to the users. So in this paper the method is presented through which password can be securely distributed to several users. When necessary, the original password can be recovered and used further. So this paper provides a method through which user can share information securely. From the experiment and verification it is found that the algorithm gives satisfactory results.
引用
收藏
页码:731 / 735
页数:5
相关论文
共 50 条
  • [1] Password-Protected Secret Sharing
    Bagherzandi, Ali
    Jarecki, Stanislaw
    Saxena, Nitesh
    Lu, Yanbin
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 433 - 443
  • [2] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    [J]. INFORMATION SCIENCES, 2020, 519 : 1 - 8
  • [3] Secure Secret Sharing in the Cloud
    Chang, Ching-Chun
    Li, Chang-Tsun
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2017, : 358 - 361
  • [4] Robust Password-Protected Secret Sharing
    Abdalla, Michel
    Cornejo, Mario
    Nitulescu, Anca
    Pointcheval, David
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 61 - 79
  • [5] Password Protected Secret Sharing from Lattices
    Roy, Partha Sarathi
    Dutta, Sabyasachi
    Susilo, Willy
    Safavi-Naini, Reihaneh
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 442 - 459
  • [6] Computationally Secure Secret Image Sharing
    Ahmadian, Amir M.
    Amirmazlaghani, Maryam
    [J]. 2017 25TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2017, : 2217 - 2222
  • [7] Enhanced Visual Secret Sharing For Graphical Password Authentication
    Rajendra, A. B.
    Sheshadri, H. S.
    [J]. INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [8] Threshold changeable secret sharing with secure secret reconstruction
    Meng, Keju
    Miao, Fuyou
    Huang, Wenchao
    Xiong, Yan
    [J]. INFORMATION PROCESSING LETTERS, 2020, 157
  • [9] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [10] Secure Collaborative Editing Using Secret Sharing
    Arora, Shashank
    Atrey, Pradeep K.
    [J]. 2021 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2021, : 128 - 133