of the user. In this paper a scheme known as secret sharing is used to securely distribute
user's work among different parties. Objective behind the paper is to provide such a protocol
that enhance and achieve privacy and other expectations of the owner of the information.
The scheme states that, the information is accessible only when at least k shareholders from
n must get together. User's shares are constructing through quadratic polynomial. To make …