Split master: secure file sharing application based on shamir secret sharing scheme (Record no. 5030)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01816nam a22001817a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220107122810.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160328b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE | |
Transcribing agency | |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Krishna Kumar V (93613016) |
9 (RLIN) | 8698 |
245 ## - TITLE STATEMENT | |
Title | Split master: secure file sharing application based on shamir secret sharing scheme |
502 ## - DISSERTATION NOTE | |
Degree type | Master of Science in Computer Science and Information security |
Name of granting institution | 2013-2015 |
Year degree granted | EXT |
-- | Tony Thomas |
-- | Jacob Nina (Director) |
Miscellaneous information | "Kottackal Business Solutions Pvt Ltd." |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the important files will be inaccessible. Thus, secure and efficient key management mechanisms are required. One of them is secret sharing scheme (SSS) that lets you split your secret into several parts and distribute them among selected parties. Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number, of possibly different types, of shares is combined together. This project is based on Shamir secret sharing cryptographic method. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | INFORMATION SYSTEMS |
9 (RLIN) | 8699 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | SECURITY AND PRIVACY |
9 (RLIN) | 8700 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | NETWORK SECURITY |
9 (RLIN) | 8701 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 28/03/2016 | R-715 | 28/03/2016 | 28/03/2016 | Project Reports |