The secret sharing schemes are intended for sharing of secret keys. Secret information is being encrypted and afterwards the key of encryption is shared among participants. The above mentioned version of sharing ensures only data confidentiality. This paper describes the new method which ensures the data confidentiality, integrity and availability at once. It is based on the complete sharing of secret information. Taking into consideration the continuous growth of data amount and poor performance of existing sharing schemes, the new, faster method has been developed. It is based on Error-Correcting Codes. The resulting system is faster than the widespread scheme of Shamir.

Published in: World Congress on Internet Security (WorldCIS-2016)

  • Date of Conference: 14-16 November 2016
  • DOI: 10.2053/WorldCIS.2016.0017
  • ISBN: 978-1-908320-66-7
  • Conference Location: Heathrow Windsor Marriott Hotel, UK