Authors:
            
                    Mohsen Ahmadvand
                    
                        
                                1
                            
                    
                    ; 
                
                    Antoine Scemama
                    
                        
                                2
                            
                    
                    ; 
                
                    Martín Ochoa
                    
                        
                                3
                            
                    
                     and
                
                    Alexander Pretschner
                    
                        
                                1
                            
                    
                    
                
        
        
            Affiliations:
            
                    
                        
                                1
                            
                    
                    Technische Universität München, Germany
                
                    ; 
                
                    
                        
                                2
                            
                    
                    Brainloop, Germany
                
                    ; 
                
                    
                        
                                3
                            
                    
                    Singapore University of Technology and Design, Singapore
                
        
        
        
        
        
             Keyword(s):
            Secret Sharing, Master Key Security, Threshold Based Schemes, Generalized Access Structure.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Access Control
                    ; 
                        Applied Cryptography
                    ; 
                        Cryptographic Techniques and Key Management
                    ; 
                        Data and Application Security and Privacy
                    ; 
                        Data Engineering
                    ; 
                        Databases and Data Security
                    ; 
                        Identification, Authentication and Non-Repudiation
                    ; 
                        Information and Systems Security
                    ; 
                        Information Assurance
                    ; 
                        Insider Threats and Countermeasures
                    ; 
                        Internet Technology
                    ; 
                        Organizational Security Policies
                    ; 
                        Trust Management and Reputation Systems
                    ; 
                        Web Information Systems and Technologies
                    
            
        
        
            
                Abstract: 
                Storing highly confidential data and carrying out security-related operations are crucial to many systems. Starting
from an industrial use case we propose a generic architecture based on secret sharing which address critical
operation authorization. By comparing and benchmarking different scheme from the literature we analyze the
different trade-offs (security, functionality, performance) which can be achieved. Finally by providing an open
source .NET implementation of several secret sharing schemes, this paper aims to rise awareness regarding
the capabilities of such algorithms to increase security in industrial setting.