International Journal of Applied Information Systems |
Foundation of Computer Science (FCS), NY, USA |
Volume 6 - Number 2 |
Year of Publication: 2013 |
Authors: Saria Islam, A. S. M Mahmudul Hasan |
10.5120/ijais13-451003 |
Saria Islam, A. S. M Mahmudul Hasan . Implementation of Shamir�s Secret Sharing on Proactive Network. International Journal of Applied Information Systems. 6, 2 ( September 2013), 17-22. DOI=10.5120/ijais13-451003
For most cryptosystems, by using a single-system master key there is a need to protect many important encryption and decryption keys used to achieve data security. There are three major drawbacks under this single-master key arrangement. First, if the master key is disclosed to the public by accident, then the entire system has no secrecy at all. Second, if the master key is lost, then all the keys under protection become inaccessible. Third, if the owner of the master key becomes disloyal, then all important information becomes completely available to the opponents. The secret sharing scheme was designed to overcome these problems. Shamir's (t, n)-threshold scheme is one of the most well-known examples of secret sharing schemes which provides a very simple and efficient way to share a secret among any t of the n participants. The primary goal of our research is to study the terminology and protocols behind secret sharing schemes and implement Shamir's scheme using Java. In addition, we have also introduced a new scheme for extending the Shamir's scheme on proactive network.