Efficient secret sharing scheme with cheater identification based on QR code

被引:1
|
作者
Huang, Peng-Cheng [1 ,2 ]
Chang, Chin-Chen [2 ]
Li, Yung-Hui [3 ]
Liu, Yanjun [2 ]
机构
[1] Xiamen Univ Technol, Dept Comp Sci & Technol, Xiamen 361024, Fujian, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 207, Taiwan
[3] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
关键词
Secret sharing; cheater identification; QR code; Reed-Solomon code; Latin square;
D O I
10.3837/tiis.2019.10.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is an effective way of protecting secret messages. However, the traditional secret sharing schemes are considered meaningless due to malicious people attention which might raise risks. To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. The secret message will be split and concealed in the padding region of cover QR codes with the assistance of Latin square and it can be completely restored when all the involved participants cooperate. The concealing strategy exploits the characteristic of Reed-Solomon (RS) code to ensure the strong robustness of generated QR code pseudo-shares. The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. The results showed that the proposed scheme is feasible, efficient and secure compared to the other existing schemes. It also achieves a higher secret payload and maintains stronger robustness.
引用
收藏
页码:5144 / 5160
页数:17
相关论文
共 50 条
  • [1] Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code
    Lin, Pei-Yu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (01) : 384 - 392
  • [2] Cheater identification in secret sharing scheme
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 2000, 29 (01): : 38 - 40
  • [3] Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application
    Huang, Peng-Cheng
    Chang, Ching-Chun
    Li, Yung-Hui
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (01): : 155 - 163
  • [4] Sudoku-based secret sharing approach with cheater prevention using QR code
    Peng-Cheng Huang
    Chin-Chen Chang
    Yung-Hui Li
    Multimedia Tools and Applications, 2018, 77 : 25275 - 25294
  • [5] Sudoku-based secret sharing approach with cheater prevention using QR code
    Huang, Peng-Cheng
    Chang, Chin-Chen
    Li, Yung-Hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25275 - 25294
  • [6] QR Code-Based Visual Secret Sharing Scheme: A Review
    Chu, Shu-Chuan
    Liu, Tao
    Pan, Jeng-Shyang
    Journal of Network Intelligence, 2024, 9 (04): : 2642 - 2661
  • [7] Threshold Meaningful Secret Image Sharing Scheme Based on QR Code
    Hu, Fei
    Yao, Yuanzhi
    Li, Weihai
    Yu, Nenghai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Visual Secret Sharing Scheme for Color QR Code
    Tan, Longdan
    Liu, Kesheng
    Yan, Xuehu
    Wan, Song
    Chen, Jinrui
    Chang, Chao
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 961 - 965
  • [9] An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
    Roy, Partha Sarathi
    Adhikari, Avishek
    Xu, Rui
    Morozov, Kirill
    Sakurai, Kouichi
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 47 - +
  • [10] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51