Smart expansion of target key for more handlers to access multimedia counting-based secret sharing

被引:0
作者
Adnan Gutub
Taghreed AlKhodaidi
机构
[1] Umm Al-Qura University,Computer Engineering Department
[2] Umm Al-Qura University,Computer Science Department at Al
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Counting-based secret sharing; Information security; Key management; Shares generation; Secret reconstruction; Target key expansion;
D O I
暂无
中图分类号
学科分类号
摘要
The secret sharing scheme is a data security tool to provide safe reliability and robustness for multi-user authentication systems. This work focus on expanding counting-based secret sharing technique to generate more shares for more handlers’ services considering security as well as simple and fast computation. The research considers resolving some originally published imperfections in the share’s generation phase proposing new smart expansion models validated to be optimized practical and efficient. We proposed seven possible models to expand the number of participants for applicable share’s keys generated from the target key. The smart security randomness of the shares and target keys adjusted were all analyzed to select the best choice based on consistency randomness test. The study further used standard simulations applied on two different applicable multimedia target keys sizes of 16-bits and 64-bits showing attractive remarks pointing for further research improvements to continue. The improved smart system has been analyzed according to distortion security and capacity parameters showing attractive contributions.
引用
收藏
页码:17373 / 17401
页数:28
相关论文
共 31 条
  • [11] Ito M(1996)Optimum secret sharing scheme secure against cheating Eurocrypt 1070 200-211
  • [12] Saito A(2005)A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing Appl Math Comput 167 840-848
  • [13] Nishizeki T(2013)A Review of secret sharing schemes Res J Inf Technol 5 67-72
  • [14] Masucci B(1979)How to share a secret Commun ACM 22 612-613
  • [15] McEliece RJ(2007)Hierarchical threshold secret sharing J Cryptol 20 237-264
  • [16] Sarwate DV(1989)How to share a secret with cheaters J Cryptol 1 133-138
  • [17] Ogata W(2007)Two secret sharing schemes based on Boolean operations Pattern Recogn 40 2776-2785
  • [18] Kurosawa K(undefined)undefined undefined undefined undefined-undefined
  • [19] Pang LJ(undefined)undefined undefined undefined undefined-undefined
  • [20] Wang YM(undefined)undefined undefined undefined undefined-undefined