共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
4.
Colour image secret sharing 总被引:7,自引:0,他引:7
A secret sharing scheme suitable for encrypting colour images is introduced. The required colour shares are obtained during encryption by operating at the bit-levels. Perfect reconstruction is achieved by the decryption module using only logical operations. 相似文献
5.
On secret sharing systems 总被引:7,自引:0,他引:7
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(1):35-41
A "secret sharing system" permits a secret to be shared amongn trustees in such a way that anyk of them can recover the secret, but anyk-1 have complete uncertainty about it. A linear coding scheme for secret sharing is exhibited which subsumes the polynomial interpolation method proposed by Shamir and can also be viewed as a deterministic version of Blakley's probabilistic method. Bounds on the maximum value ofn for a givenk and secret size are derived for any system, linear or nonlinear. The proposed scheme achieves the lower bound which, for practical purposes, differs insignificantly from the upper bound. The scheme may be extended to protect several secrets. Methods to protect against deliberate tampering by any of the trustees are also presented. 相似文献
6.
Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a secret key, secret sharing takes an approach to ensure well protection of transmitted information by allowing a secret message M to be divided into n pieces. Secret message M can be held by n participants to avoid the secret from incidentally or intentionally being lost. In a secret sharing scheme, secret information leaks from shadows, attack on shadow image, and large shadow image issues which has arisen when developing an algorithm. Although existing algorithms provide remedies for such problems, the computational complexity of existing algorithms is still questionable. Therefore, we propose a low computational complexity Quadri-Directional Searching Algorithm (QDSA) for secret image sharing. Experiment results show that the proposed algorithm ensures that generated shares are of high quality and no secret information is leaked from these shares, thus it guarantees high security of our scheme. 相似文献
7.
Strongly ideal secret sharing schemes 总被引:1,自引:0,他引:1
We define strongly ideal secret sharing schemes to be ideal secret sharing schemes in which certain natural requirements are
placed on the decoder. We prove an information-theoretic characterization of perfect schemes, and use it to determine which
access structures can be encoded by strongly ideal schemes. We also discuss a hierarchy of secret sharing schemes that are
more powerful than strongly ideal schemes. 相似文献
8.
Multiple assignment scheme for sharing secret 总被引:6,自引:0,他引:6
In a secret sharing scheme, a datumd is broken into shadows which are shared by a set of trustees. The family {P′⊆P:P′ can reconstructd} is called the access structure of the scheme. A (k, n)-threshold scheme is a secret sharing scheme having the access structure {P′⊆P: |P′|≥k}. In this paper, by observing a simple set-theoretic property of an access structure, we propose its mathematical definition.
Then we verify the definition by proving that every family satisfying the definition is realized by assigning two more shadows
of a threshold scheme to trustees.
This work was partly supported by the Telecommunications Advancement Foundation. Also the work of the second author was partly
supported by the Grant in Aid for Scientific Research of the Ministry of Education, Science and Culture of Japan under Grant
Number YSE (A) 62780017. 相似文献
9.
Graph decompositions and secret sharing schemes 总被引:3,自引:0,他引:3
In this paper we continue a study of secret sharing schemes for-access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G; otherwise, they can obtain no information regarding the key. We study the information rate of such schemes, which measures how much information in being distributed as shares compared with the size of the secret key, and the average information rate, which is the ratio between the secret size and the arithmetic mean of the size of the shares. We give both upper and lower bounds on the optimal information rate and average information rate that can be obtained. Upper bounds arise by applying entropy arguments due to Capocelli et al. [15]. Lower bounds come from constructions that are based on graph decompositions. Application of these constructions requires solving a particular linear programming problem. We prove some general results concerning the information rate and average information rate for paths, cycles, and trees. Also, we study the 30 (connected) graphs on at most five vertices, obtaining exact values for the optimal information rate in 26 of the 30 cases, and for the optimal average information rate in 28 of the 30 cases.The research of C. Blundo, A. De Santis, and U. Vaccaro was partially supported by the Italian Ministry of University and Research (M.U.R.S.T.) and by the National Council for Research (C.N.R.) under Grant 91.02326.CT12. The research of D. R. Stinson was supported by NSF Grant CCR-9121051. 相似文献
10.
无条件安全的可验证密钥共享系统 总被引:1,自引:0,他引:1
讨论了门限方案的抗欺骗功能,研究了基于最大距离可分码的门限方案的抗欺骗功能;基于无条件安全认证码构造了无条件安全的可防止欺骗的密钥共享方案,并讨论了该方案的特性。 相似文献
11.
We present a general model for communication among a team of players overheard by a passive eavesdropper, Eve, in which all players including Eve are given private inputs that may be correlated. We define and explore secret key exchange in this model. Our secrecy requirements are information-theoretic and hold even if Eve is computationally unlimited. In particular, we consider the situation in which the team players are dealt hands of cards of prespecified sizes from a known deck of distinct cards. We explore when the team players can use the information contained in their hands to determine a value that each team player knows exactly but Eve cannot guess.This research was supported in part by National Science Foundation Grant IRI-9015570. The second author's research was completed while at Yale University. 相似文献
12.
Ideal secret sharing schemes with multiple secrets 总被引:6,自引:0,他引:6
We consider secret sharing schemes which, through an initial issuing of shares to a group of participants, permit a number of different secrets to be protected. Each secret is associated with a (potentially different) access structure and a particular secret can be reconstructed by any group of participants from its associated access structure without the need for further broadcast information. We consider ideal secret sharing schemes in this more general environment. In particular, we classify the collections of access structures that can be combined in such an ideal secret sharing scheme and we provide a general method of construction for such schemes. We also explore the extent to which the results that connect ideal secret sharing schemes to matroids can be appropriately generalized.The work of the second and third authors was supported by the Australian Research Council. 相似文献
13.
理论意义上安全的密钥分配协议是近几年研究的热点,已经研究多时的量子密钥分配协议也可以归结为理论意义上安全的密钥分配协议.一旦理解了它,就可以从更高的角度来理解量子密钥分配协议.它也提出了如何用经典的办法来达到量子密钥分配的安全性以及其局限性.现就理论意义上安全的密钥分配协议进行了总结. 相似文献
14.
On the classification of ideal secret sharing schemes 总被引:13,自引:0,他引:13
In a secret sharing scheme a dealer has a secret key. There is a finite set P of participants and a set of subsets of P. A secret sharing scheme with as the access structure is a method which the dealer can use to distribute shares to each participant so that a subset of participants can determine the key if and only if that subset is in . The share of a participant is the information sent by the dealer in private to the participant. A secret sharing scheme is ideal if any subset of participants who can use their shares to determine any information about the key can in fact actually determine the key, and if the set of possible shares is the same as the set of possible keys. In this paper we show a relationship between ideal secret sharing schemes and matroids.This work was performed at the Sandia National Laboratories and was supported by the U.S. Department of Energy under Contract No. DE-AC04-76DP00789. 相似文献
15.
可防止欺诈的动态秘密分享方案 总被引:25,自引:0,他引:25
基于有限域上离散对数难解问题提出一个计算安全的动态秘密分享方案 ,本方案有效地解决了密钥的翻新与复用问题 ,其效率高且实用 ,特别是能检测伪子密 ,防止欺诈 ,且数据利用率较高。 相似文献
16.
基于单向函数的广义秘密共享方案 总被引:11,自引:0,他引:11
提出了广义秘密共享方案的概念,并给出了两个基于单向函数的广义秘密共享方案,这两个方案只需每个成员保存一个子秘密,而且每个成员的子秘密可以重复使用,并且在更新成员时无需更改每个成员的子秘密。 相似文献
17.
Han-Seung Koo O-Hyung Kwon Sung-Woong Ra 《Communications Letters, IEEE》2009,13(11):874-876
A tree key graph design scheme for hierarchical multi-group access control with low communication overhead is presented. A simulation result shows that the proposed scheme can reduce a communication overhead up to about 15.2% compared to the previously proposed scheme. 相似文献
18.
This paper presents a two-layered structure for optimally sharing a secret image among s essential and n − s non-essential shared shadows using the (t, s, k, n) essential thresholds, that t essential shared shadows and totally k shared shadows are needed to recover the secret image. The presented two-layered structure includes one user-defined parameter m to determine different kinds of optimal results. m = 1 leads to minimum size of total shared shadows (ST) and size of an essential shared shadow is close to size of a non-essential shared shadow. On the other hand, m = t leads to size of an essential shared shadow being twice of size of a non-essential shared shadow to signify the importance of an essential shared shadow. Moreover, the proposed structure overcomes the threshold fulfillment problem in Chen’s scheme (Chen, 2016). Theoretical analyses and experimental results show that the proposed scheme exhibits secure with optimal sharing ratios among related works. 相似文献
19.
Visual secret sharing (VSS) schemes providing secret communication services are classified into two categories depending on the method of encoding the secret: visual cryptography (VC)-based and random grid (RG)-based schemes. A friendly progressive version of the VC-based VSS scheme was presented in 2008; however, it is marred by pixel expansion, which is the innate deficiency of conventional VC-based VSS schemes. This paper proposes a suitable user-friendly RG-based VSS scheme with progressive secret reconstruction and without pixel expansion. The experimental results of the developed scheme validated its feasibility, and a theoretical analysis demonstrated its visual quality and security. 相似文献
20.
On the size of shares for secret sharing schemes 总被引:7,自引:0,他引:7
A secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret, but any nonqualified subset has absolutely no information on the secret. The set of all qualified subsets defines the access structure to the secret. Sharing schemes are useful in the management of cryptographic keys and in multiparty secure protocols.We analyze the relationships among the entropies of the sample spaces from which the shares and the secret are chosen. We show that there are access structures with four participants for which any secret sharing scheme must give to a participant a share at least 50% greater than the secret size. This is the first proof that there exist access structures for which the best achievable information rate (i.e., the ratio between the size of the secret and that of the largest share) is bounded away from 1. The bound is the best possible, as we construct a secret sharing scheme for the above access structures that meets the bound with equality.This work was partially supported by Algoritmi, Modelli di Calcolo e Sistemi Informativi of M.U.R.S.T. and by Progetto Finalizzato Sistemi Informatici e Calcolo Parallelo of C.N.R. under Grant Number 91.00939.PF69. 相似文献