Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Python based Approach to Enhance Security using Secret Sharing Scheme

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 11
Year of Publication: 2014
Siyaram Gupta
Madhu Sharma

Siyaram Gupta and Madhu Sharma. Article: A Python based Approach to Enhance Security using Secret Sharing Scheme. International Journal of Computer Applications 89(11):4-7, March 2014. Full text available. BibTeX

	author = {Siyaram Gupta and Madhu Sharma},
	title = {Article: A Python based Approach to Enhance Security using Secret Sharing Scheme},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {11},
	pages = {4-7},
	month = {March},
	note = {Full text available}


Privacy of the information is one of the major issues in digital world. However it is responsibility of the owner of the information to secure it from disclosure and unauthorized access. The main motivation behind this protocol is to ensures individual privacy along with integrity of the information. To achieve such security requirements a sharing scheme formally known as secret sharing scheme is proposed. According to this well-known (k, n) threshold scheme at-least k shareholders must gather to regenerate the secret [2]. The Lagrange interpolation polynomial used to construct the shares for participants [3] in this proposed concept. Secret sharing is a method for distributing a piece of secrets amongst a group of individuals, each of which is allotted some share related to the secret. The secret can only be reconstructed according to its threshold value. Python is used to implement the concept of secret sharing scheme because of its ease of use and huge collection of functions, libraries and modules. It is easy to generate and use polynomials using python.


  • Medical image security and EPR hiding using Shamir's secret sharing scheme, Mustafa Ulutas, Güzin Ulutas?, Vasif V. Dept. Of Computer Engineering, Karadeniz Technical University, 61080 Trabzon, Turkey.
  • A. Shamir, How to share a secret, Communications of the ACM 22 (11) (1979) 612–613.
  • A practical verifiable multi-secret sharing scheme. Jianjie Zhao, Jianzhong Zhang, Rong Zhao. College of Mathematics and Information Science, Shaanxi Normal University, Xi'an 710062, People's Republic of Chin b Natural Science Institute, Xi'an University of Technology, Xi'an 710048, People's Republic of China.
  • G. Blakley, Safeguarding cryptographic keys, Proc AFIPS 1979 National Computer Conference, AFIPS Press, New York, 1979, pp. 313–317.
  • J. He, E. Dawson, Multisecret-sharing scheme based on one-way function, Electronics Letters 31 (2) (1995) 93–95.
  • C. -C. Yang, T. -Y. Chang, M. -S. Hwang, A (t, n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490.
  • B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, Proc. 26th IEEE Symp. FOCS, 1985, pp. 251–260.
  • L. Harn, Efficient sharing (broadcasting) of multiple secret, Computers and Digital Techniques 142 (3) (1995) 237–240.
  • J. Shao, Z. -F. Cao, A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme, Applied Mathematics and Computation 168 (2005) 135–140.
  • R. -J. Hwang, C. -C. Chang, An on-line secret sharing scheme for multisecrets, Computer Communications 21 (13) (1998) 1170–1176.
  • H. -Y. Chien, J. -K. Tseng, A practical (t,n) multi-secret sharing scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer 83-A (12) (2000) 2762–2765.
  • J. He, E. Dawson, Multistage secret sharing based on one-way function, Electronics Letters 30 (19) (1994) 1591–1592.