An Efficient and Secured Secret Password Sharing Technique using Block Chain
Adury Vijay Kumar1, Avvaru Anil Kumar2, Kotra Mounica3, Sambangi Hitesh4
1Adury Vijay Kumar, Department of Computer Science Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, (A.P) India
2Avvaru Anil Kumar, UG Students, Department of Computer Science Engineering, KoneruLakshmaiah Education Foundation, Vaddeswaram, (A.P) India.
3Kotra Mounica, UG Students, Department of Computer Science Engineering, KoneruLakshmaiah Education Foundation, Vaddeswaram, (A.P) India.
4Sambangi Hitesh, UG Students, Department of Computer Science Engineering, KoneruLakshmaiah Education Foundation, Vaddeswaram, (A.P) India.
Manuscript received on 23 March 2019 | Revised Manuscript received on 30 March 2019 | Manuscript published on 30 March 2019 | PP: 541-543 | Volume-7 Issue-6, March 2019 | Retrieval Number: F2309037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: It will be the age communication and information methodology. Novel methodologies are developing gradually. With the advancement of novel technologies, secret & private data are also expanding. Whether this dangerous data will to be shared then point it gets exceptionally troublesome to share this private &secure data. In this manuscript, centralization will be completed on emerging a method to share secret ID safely utilizing secret sharing method. The secret sharing method begins withsecret & then derives from it specific shares that are dispersed to clients. Consequently, in this manuscript, the technique will be exhibited through that secret ID might be safely disseminated to few clients. At necessary, the unique secret ID might be improved & utilized. Therefore, this manuscript gives a technique through that client might share data safely. From the evaluation &confirmation it will be establish that the algorithm provides reasonable outcomes.
Keywords: Password authentication, Secret Sharing, Information Security.
Scope of the Article: Security, Trust and Privacy