The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled `Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust'. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.
[1]
Alessandro Orso,et al.
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
,
2005,
ASE.
[2]
Muhammad Adeka,et al.
Cryptography and computer communications security: extending the human security perimeter through a web of trust
,
2015
.
[3]
Jati K. Sengupta,et al.
Introduction to Information
,
1993
.
[4]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[5]
Keith M. Martin.
Challenging the adversary model in secret sharing schemes
,
2007
.
[6]
Vincenzo A. Sainato,et al.
Cyber War Will Not Take Place
,
2012
.
[7]
C. L. Liu,et al.
Introduction to Combinatorial Mathematics.
,
1971
.