Data Security in Proactive Network using Secret Sharing Mechanism
For most of the cryptosystems, using a single master key system is not enough to protect important documents, there is a need of many encryption and decryption keys for this purpose. A Secret Sharing Scheme is the method which divides the secret into several parts and distributes them among the specific communicating entities in such a way that only these participants can reconstruct the secret by poling there share. Hence, unauthorised entity cannot reconstruct the secret. The best way to implement such a system is in cloud environment. Shamir’s(t, n) threshold scheme is one of the most well-known and widely used example of secret sharing systems.