A Cheating Model for Cellular Automata-Based Secret Sharing Schemes

被引:0
作者
Jafarpour, Borna [1 ]
Nematzadeh, Azadeh [1 ]
Kazempour, Vahid [1 ]
Sadeghian, Babak [2 ]
机构
[1] Amirkabir Univ Technol, Tehran, Iran
[2] Amirkabir Univ Technol, Dept Elect & Comp Engn, Tehran, Iran
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25 | 2007年 / 25卷
关键词
Cellular Automata; Cheating Model; Secret Sharing; Threshold Scheme;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants' collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
引用
收藏
页码:306 / +
页数:2
相关论文
共 14 条
[1]  
Alonso-Sanz R., 2003, Complex Systems, V14, P99
[2]   One-dimensional cellular automata with memory:: Patterns from a single site seed [J].
Alonso-Sanz, R ;
Martín, M .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2002, 12 (01) :205-226
[3]   A secure scheme to share secret color images [J].
Alvarez, G ;
Encinas, AH ;
Encinas, LH ;
del Rey, AM .
COMPUTER PHYSICS COMMUNICATIONS, 2005, 173 (1-2) :9-16
[4]  
[Anonymous], 1983, LOS ALAMOS SCI
[5]  
Blakley G. R., 1979, P NAT COMP C, P313, DOI [DOI 10.1109/MARK.1979.8817296, 10.1109/MARK.1979.8817296]
[6]   A secret sharing scheme based on cellular automata [J].
del Rey, AM ;
Mateus, JP ;
Sánchez, GR .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) :1356-1364
[7]  
GHODOSI H, 2000, AUSTR C INF SEC PRIV, P328
[8]  
Marañón GA, 2005, LECT NOTES COMPUT SC, V3522, P411
[9]  
MARANON GA, 2003, 0312034 CORR
[10]   A formal framework and evaluation method for network denial of service [J].
Meadows, C .
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, :4-13