Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing

被引:0
作者
Wang, Rui [1 ]
Li, Longlong [2 ]
Yang, Guozheng
Yan, Xuehu
Yan, Wei [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cryptography; Encryption; Image segmentation; Steganography; Propagation losses; Polynomials; Information leakage; Image reconstruction; Transforms; Secret image sharing; Chinese remainder theorem; vulnerability exploitation; chain obfuscation; security enhancement; CHINESE REMAINDER THEOREM; LOSSLESS (K; DOMAIN;
D O I
10.1109/TIFS.2024.3477265
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sharing. For decades, numerous schemes have been proposed for practical applications of AB-SS, such as secret image sharing (SIS). However, in terms of security, AB-SS has proved to be neither ideal nor perfect, and its derivatives in image sharing exhibit vulnerabilities associated with secret leakage. This paper studies the security issues in the SIS schemes derived from AB-SS and improves the core sharing principle of AB-SS to enhance security in image protection. First, for (2, n)-CRTSIS schemes, we exploit the vulnerability in a single share image to crack the confidential information of the original image, including secret pixel values and the ratio of different pixels. Then, by employing the XOR operation, we introduce a chain obfuscation technology and propose a secure image sharing scheme based on the Chinese remainder theorem (COxor-CRTSIS). The COxor-CRTSIS scheme utilizes integer linear programming for achieving lossless recovery without segmentation and eliminates potential secret disclosure risks without additional encryption. Furthermore, to comprehensively evaluate the security of existing schemes, this paper presents three metrics, information loss rate, fluctuation degree, and coverage rate, enabling a quantitative comparison of security for the first time. Theoretical analyses and experiments are conducted to validate the effectiveness of our scheme.
引用
收藏
页码:9819 / 9834
页数:16
相关论文
共 50 条
  • [1] Homomorphic extensions of CRT-based secret sharing
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Anarim, Emin
    DISCRETE APPLIED MATHEMATICS, 2020, 285 (285) : 317 - 329
  • [2] On modular (CRT-based) secret sharing
    Shenets, Nikolay N.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04): : 765 - 782
  • [3] A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
    Lei WU
    Fuyou MIAO
    Keju MENG
    Xu WANG
    Frontiers of Computer Science, 2022, 16 (01) : 148 - 156
  • [4] A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
    Lei Wu
    Fuyou Miao
    Keju Meng
    Xu Wang
    Frontiers of Computer Science, 2022, 16
  • [5] A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
    Wu, Lei
    Miao, Fuyou
    Meng, Keju
    Wang, Xu
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (01)
  • [6] A CRT-based verifiable secret sharing scheme secure against unbounded adversaries
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Kaya, Kamer
    Selcuk, Ali Aydin
    Anarim, Emin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4416 - 4427
  • [7] Secret Image Sharing Schemes: A Comprehensive Survey
    Saha, Sanchita
    Chattopadhyay, Arup Kumar
    Barman, Anup Kumar
    Nag, Amitava
    Nandi, Sukumar
    IEEE ACCESS, 2023, 11 : 98333 - 98361
  • [8] Multipartite Secret Sharing Based on CRT
    Hsu, Ching-Fang
    Harn, Lein
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (01) : 271 - 282
  • [9] Multipartite Secret Sharing Based on CRT
    Ching-Fang Hsu
    Lein Harn
    Wireless Personal Communications, 2014, 78 : 271 - 282
  • [10] Relations Between Secret Sharing and Secret Image Sharing
    Yan, Xuehu
    Li, Jinming
    Lu, Yuliang
    Liu, Lintao
    Yang, Guozheng
    Chen, Huixian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 79 - 93