Cooperative Secret Sharing Using QR Codes and Symmetric Keys

被引:17
作者
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
Tonien, Joseph [1 ]
Vlahu-Gjorgievska, Elena [2 ]
Yang, Guomin [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[2] Univ Wollongong, Sch Comp & Informat Technol, Ctr Persuas Technol & Soc, Wollongong, NSW 2522, Australia
来源
SYMMETRY-BASEL | 2018年 / 10卷 / 04期
关键词
cooperative; Quick Response (QR) code; secret sharing; symmetric key; SCHEME;
D O I
10.3390/sym10040095
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR) codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.
引用
收藏
页数:13
相关论文
共 25 条
[1]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[2]   Secret handshakes from pairing-based key agreements [J].
Balfanz, D ;
Durfee, G ;
Shankar, N ;
Smetters, D ;
Staddon, J ;
Wong, HC .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :180-196
[3]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[5]   Robust Message Hiding for QR Code [J].
Bui, Thach V. ;
Vu, Nguyen K. ;
Nguyen, Thong T. P. ;
Echizen, Isao ;
Nguyen, Thuc D. .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :520-523
[6]   Nested image steganography scheme using QR-barcode technique [J].
Chen, Wen-Yuan ;
Wang, Jing-Wein .
OPTICAL ENGINEERING, 2009, 48 (05)
[7]  
Cheng Y., 2017, MULTIMEDIA TOOLS APP
[8]  
Chin-Ho Chung, 2009, Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2009, P522, DOI 10.1109/IIH-MSP.2009.119
[9]   A QR Code Watermarking Approach Based on the DWT-DCT Technique [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Tonien, Joseph ;
Zong, Wei .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 :314-331
[10]   Covert QR Codes: How to Hide in the Crowd [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Baek, Joonsang .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 :678-693