alexa Data Security in Proactive Network using Secret Sharin
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

Data Security in Proactive Network using Secret Sharing Mechanism

To read the full article Peer-reviewed Article PDF image


For most of the cryptosystems, using a single master key system is not enough to protect important documents, there is a need of many encryption and decryption keys for this purpose. A Secret Sharing Scheme is the method which divides the secret into several parts and distributes them among the specific communicating entities in such a way that only these participants can reconstruct the secret by poling there share. Hence, unauthorised entity cannot reconstruct the secret. The best way to implement such a system is in cloud environment. Shamir’s(t, n) threshold scheme is one of the most well-known and widely used example of secret sharing systems.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version