3 research outputs found
A Randomized Kernel-Based Secret Image Sharing Scheme
This paper proposes a ()-threshold secret image sharing scheme that
offers flexibility in terms of meeting contrasting demands such as information
security and storage efficiency with the help of a randomized kernel (binary
matrix) operation. A secret image is split into shares such that any or
more shares () can be used to reconstruct the image. Each share has a
size less than or at most equal to the size of the secret image. Security and
share sizes are solely determined by the kernel of the scheme. The kernel
operation is optimized in terms of the security and computational requirements.
The storage overhead of the kernel can further be made independent of its size
by efficiently storing it as a sparse matrix. Moreover, the scheme is free from
any kind of single point of failure (SPOF).Comment: Accepted in IEEE International Workshop on Information Forensics and
Security (WIFS) 201
Ideal Tightly Couple (t,m,n) Secret Sharing
As a fundamental cryptographic tool, (t,n)-threshold secret sharing
((t,n)-SS) divides a secret among n shareholders and requires at least t,
(t<=n), of them to reconstruct the secret. Ideal (t,n)-SSs are most desirable
in security and efficiency among basic (t,n)-SSs. However, an adversary, even
without any valid share, may mount Illegal Participant (IP) attack or
t/2-Private Channel Cracking (t/2-PCC) attack to obtain the secret in most
(t,n)-SSs.To secure ideal (t,n)-SSs against the 2 attacks, 1) the paper
introduces the notion of Ideal Tightly cOupled (t,m,n) Secret Sharing (or
(t,m,n)-ITOSS ) to thwart IP attack without Verifiable SS; (t,m,n)-ITOSS binds
all m, (m>=t), participants into a tightly coupled group and requires all
participants to be legal shareholders before recovering the secret. 2) As an
example, the paper presents a polynomial-based (t,m,n)-ITOSS scheme, in which
the proposed k-round Random Number Selection (RNS) guarantees that adversaries
have to crack at least symmetrical private channels among participants before
obtaining the secret. Therefore, k-round RNS enhances the robustness of
(t,m,n)-ITOSS against t/2-PCC attack to the utmost. 3) The paper finally
presents a generalized method of converting an ideal (t,n)-SS into a
(t,m,n)-ITOSS, which helps an ideal (t,n)-SS substantially improve the
robustness against the above 2 attacks