This project is for my cryptography master class which we need to develop a project base on their original base paper, I must say it was a fun journey instead,Below is a few things regarding SeDaSC:
The SeDaSC methodology encrypts a file with a single encryption key. Two different key shares for each of the users are generated, with the user only getting one share. The possession of a single share of a key allows the SeDaSC methodology to counter the insider threats. The other key share is stored by a trusted third party, which is called the cryptographic server.
Figure 1: Cryptography Server Dashboard
Figure 2: User Request Encryption File From CS
Figure 3: Encrypted file base on SHA256