A novel fast and provably secure (t,n)-threshold secret sharing construction for digital images

被引:4
作者
Faraoun, Kamel Mohamed [1 ]
机构
[1] Djilalli Liabbes Univ, Comp Sci Dept, Evolutionary Engn & Distributed Informat Syst Lab, Sidi Bel Abbes, Algeria
关键词
Verifiable secret sharing; Hash functions; Secure ciphering; Linear complexity;
D O I
10.1016/j.jisa.2014.10.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel verifiable (t, n)-threshold secret sharing construction using simple cryptographic building blocks. The proposed construction provides an extremely low computational cost with respect to most of existing schemes, since the sharing algorithm has a linear time complexity with respect to the number of participants and the size of the share, when the reconstruction algorithm complexity is constant with respect to the threshold t. Furthermore, the proposed construction is provably secure, and has been shown to be robust, confidential, ideal and traceable. An instance of the proposed construction is implemented using a combination of the CRT-based sharing scheme and the Salsa20 stream cipher. Experimental results and comparisons with existing approaches shows that the proposed approach provides very competitive performances, hence is very suitable to share large sized secrets such like digital images. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:331 / 340
页数:10
相关论文
共 28 条
[1]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[2]  
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V4986, P84
[3]  
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[4]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[5]   less and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation [J].
Chang, Chin-Chen ;
Ngoc-Tu Huynh ;
Le, Hai-Duong .
SIGNAL PROCESSING, 2014, 99 :159-170
[6]  
Chen CC, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, P515
[7]  
Chen CC, 2008, J INF SCI ENG, V24, P1567
[8]   Threshold visual secret sharing by random grids [J].
Chen, Tzung-Her ;
Tsao, Kai-Hsiang .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (07) :1197-1208
[9]  
Dehkordi MH, 2008, INFORM SCIENCES, V178, P2262, DOI 10.1016/j.ins.2007.11.031
[10]   A secret sharing scheme based on cellular automata [J].
del Rey, AM ;
Mateus, JP ;
Sánchez, GR .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) :1356-1364