DC Field | Value | Language |
dc.contributor.author | Edi, Victor | - |
dc.date.accessioned | 2022-09-30T08:18:22Z | - |
dc.date.available | 2022-09-30T08:18:22Z | - |
dc.date.issued | 2021-01-01 | - |
dc.identifier.uri | http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/5335 | - |
dc.description | Today's technological development is very rapid. With the development of technology, many people
use it, especially computer technology that is needed by humans both personally and in groups
(organizations) that are in dire need of computerization in storing data and every activity. | en_US |
dc.description.abstract | Threshold secret sharing is one of the cryptographic techniques to secure a
confidential data by dividing or distributing the data into several parts called shares, each part
of the data does not provide any information about the secret in question if it is not combined
with other parts. In general, thescheme is secret sharing divided into three namely Threshold,
Prevention and Disenrollment schemes. The scheme applied to this application is the threshold
secret sharing. Threshold secret sharing, has a concept that allows n people participated to
hold fractional(share) different generated from s. Meanwhile, to reconstruct the data, it is
necessary to have different pieces ofshare, each of which is held by a different participant. The
security system that will be created using one of the platforms commonly used today is Visual
Basic .NET | en_US |
dc.publisher | IOP Publishing | en_US |
dc.subject | Secret Sharing Threshold, Data, Visual Basic .NET | en_US |
dc.title | Paper Application of Method Threshold Secret Sharing in Securing Data | en_US |
dc.type | Other | en_US |
Appears in Collections: |
|