全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

SSDLP: Sharing Secret Data between Leader and Participant

DOI: 10.1155/2014/736750

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper investigates the problem of sharing the secret document containing a secret data between leader and participant(s) depending on specific conditions and rules. The participant(s) can retrieve part of the secret document but will not be able to retrieve any secret data without the leader. At the same time, the leader may have a little information about the secret document but cannot retrieve the secret data and the secret document without cooperating with participant(s). To evaluate the proposed model and the system efficiency, four tests are suggested, which are concatenation and sharing data test, leader visual test, information entropy analysis, and correlation analysis. Results show that the proposed model is efficient in sharing the data between the leader and participant(s) and the model can achieve our concept of the data sharing between leader and participant(s). However, by analyzing the proposed model using numerical tests and visual tests, the results show that the visual tests will not give attackers useful information about the original data, while the numerical tests show that the entropy attacks are not possible and the correlation between the adjacent pixels will not give useful information. Finally, the results show that the proposed model is strong against different types of attacks. 1. Introduction The secret sharing mechanism is a mechanism used in the large network to share the secret key between participants in the network, in which each participant has his own shadow. The purpose of secret sharing is to secure the key between different participants, to allow the authorized participants to retrieve the secret information, and to recover the secret key if some shadows are lost or distorted. Therefore, the key could be retrieved if and only if a specific number of participants collaborated together by using their shadows. In 1979, Shamir [1] and Blakley [2] introduced the prototype of the secret sharing named as ( , )-threshold secret sharing system. The problem statement introduced by Shamir in his work is the following. “Eleven scientists are working on a secret project. They wish to lockup the document in a cabinet so that the cabinet can be opened if and only if six or more of the scientists are present. What is the smallest number of locks needed? What is the smallest number of keys to the locks each scientist must carry?” In this paper, we try to reformulate the problem to a new problem called leader and participant sharing puzzle as follows. Eleven scientists are working on a secret project containing a secret data.

References

[1]  A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
[2]  G. R. Blakley, “Safeguarding cryptographic keys,” in Proceedings of the AFIPS National Computer Conference (NCC '79), vol. 48, pp. 313–317, 1979.
[3]  M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—Eurocrypt, vol. 94, pp. 1–12, Springer, Berlin, Germany, 2005.
[4]  C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computers and Graphics, vol. 26, no. 5, pp. 765–770, 2002.
[5]  R.-Z. Wang and S.-J. Shyu, “Scalable secret image sharing,” Signal Processing, vol. 22, no. 4, pp. 363–373, 2007.
[6]  P.-Y. Lin and C.-S. Chan, “A verifiable and recoverable secret image sharing mechanism,” in Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA '11), pp. 288–293, May 2011.
[7]  C.-H. T. Yang, Y.-H. Huang, and J.-H. Syue, “Reversible secret image sharing based on Shamir's scheme with discrete haar wavelet transform,” in Proceedings of the 2nd Annual Conference on Electrical and Control Engineering (ICECE '11), pp. 1250–1253, September 2011.
[8]  C.-C. Chang, P.-Y. Lin, Z. H. Wang, and M. C. Li, “A sudoku-based secret image sharing scheme with reversibility,” Journal of Communications, vol. 5, no. 1, pp. 5–12, 2010.
[9]  T. Bhattacharjee, J. P. Singh, and A. Nag, “A lossless secret Image sharing scheme based on pixel partitioning,” International Journal of Electronics Communication and Computer Technology, vol. 2, no. 1, 2012.
[10]  L. Jani Anbarasi and S. Kannan, “Secured secret color image sharing with steganography,” in Proceedings of the IEEE International Conference on Recent Trends in Information Technology (ICRTIT '12), pp. 44–48, 2012.
[11]  M. Huang and V. Rego, “Polynomial evaluation in secret sharing schemes,” www.cs.purdue.edu/research/PaCS/polyeval.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133