700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
Images proved to be better medium for sharing sensitive data. Earlier secret sharing schemes were based on numbers and further were also applied on images. Most of the existing schemes proposed do not have the capability of verification of the shares and hence are prone to cheating either by the original secret holder or the participants. Some of these schemes provided security but required additional computation in the form of certificate vectors or error correction codes The intent of this paper is to discuss the verifiable secret sharing schemes. The paper analyses these schemes and presents a comparative study of the same. The parameters used for comparative study are threshold, cheater identification, techniques used for verification, need secure channel, etc. This paper will support in choosing the verifiable secret sharing scheme for specific applications.