A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

被引:0
作者
Parihar, Bhawana [1 ]
Rawat, Arjun Singh [1 ]
Deshmukh, Maroti [1 ]
机构
[1] Natl Inst Technol, Srinagar 246174, Uttarakhand, India
关键词
Counting-based secret sharing; Parallel bits counting; Security; Computational efficiency; Resource-constrained environment; XOR; QUALITY; IMAGES;
D O I
10.1007/s11227-024-06130-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control. However, traditional secret sharing schemes face limitations in resource-constrained environments, such as IoT devices, embedded systems, and low-power sensors, due to constraints in computational power, memory, energy, and communication capabilities. To address these challenges, lightweight secret sharing schemes have emerged as a promising solution, aiming to provide efficient techniques for secret sharing while maintaining an acceptable level of security. One such lightweight scheme is the counting-based secret sharing scheme, specifically designed to meet the needs of resource-constrained devices and environments. This scheme leverages parallel bits counting operations to reconstruct the secret and introduces innovative techniques for generating shares, optimizing the trade-off between security and computational efficiency. This survey provides a comprehensive overview of counting-based secret sharing schemes for resource-constrained environments. It highlights recent advancements in the field, identifies promising research directions, and discusses the open challenges that lie ahead in the development and utilization of counting-based secret sharing schemes. Additionally, potential applications of counting-based secret sharing schemes in various domains such as IoT, embedded systems, low-power sensors, secure multi-party computation, cloud computing, healthcare systems, financial services, supply chain management, military and defense, smart grids, and blockchain technology are discussed to emphasize the relevance and versatility of these schemes in real-world scenarios. Through this survey, researchers gain a comprehensive understanding of counting-based secret sharing schemes. This survey aims to inspire further innovation and advancements in the field of counting-based secret sharing schemes, ultimately contributing to the development and utilization of efficient and secure secret sharing techniques in resource-constrained environments.
引用
收藏
页码:17633 / 17687
页数:55
相关论文
共 87 条
  • [71] XOR based continuous-tone multi secret sharing for store-and-forward telemedicine
    Shivani, Shivendra
    Rajitha, B.
    Agarwal, Suneeta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3851 - 3870
  • [72] A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares
    Singh, Priyanka
    Raman, Balasubramanian
    Misra, Manoj
    [J]. SIGNAL PROCESSING, 2018, 142 : 301 - 319
  • [73] A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
    Soreng A.V.
    Kandar S.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (08) : 10631 - 10655
  • [74] Robust Secret Image Sharing Scheme Against Noise in Shadow Images
    Sun, Yuyuan
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Li, Longlong
    [J]. IEEE ACCESS, 2021, 9 : 23284 - 23300
  • [75] Two secret sharing schemes based on Boolean operations
    Wang, Daoshun
    Zhang, Lei
    Ma, Ning
    Li, Xiaobo
    [J]. PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
  • [76] Decentralized data outsourcing auditing protocol based on blockchain
    Wang, Han
    Wang, Xu An
    Xiao, Shuai
    Liu, JiaSen
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 2703 - 2714
  • [77] Improved group-oriented proofs of cloud storage in IoT setting
    Wang, Xu An
    Liu, Yudong
    Zhang, Jindan
    Yang, Xiaoyuan
    Zhang, Minqing
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (21)
  • [78] Random grid-based visual secret sharing with abilities of OR and XOR decryptions
    Wu, Xiaotian
    Sun, Wei
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (01) : 48 - 62
  • [79] Wu Y, 2011, Cyber J: Multidiscipl J Sci Technol J Sel Areas Telecommun (JSAT), V1, P31, DOI DOI 10.4236/JSS.2015.33005
  • [80] Survey on Blockchain-Based Electronic Voting
    Xiao, Shuai
    Wang, Xu An
    Wang, Wei
    Wang, Han
    [J]. ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS - 2019, 2020, 1035 : 559 - 567