Secret Sharing with Reduced Share Size and Data Integrity
نویسندگان
چکیده
منابع مشابه
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size
An n-player (t, δ)-secure robust secret sharing scheme is a (t, n)-threshold secret sharing scheme with the additional property that the secret can be recovered, with probability at least 1− δ, from the set of all shares even if up to t players provide incorrect shares. The existing constructions of robust secret sharing schemes for the range n/3 ≤ t < n/2 have the share size larger than the se...
متن کاملAnalyzing Extended Secret Sharing Schemes based on Share Size
Secret sharing is the technique in which secret is distributed among n participants. Each participant has unique secret share. Secret can be recovered only after sufficient number of shares (k out of n) combined together. In many circumstances secret sharing has to provide additional capabilities to satisfy certain requirements. Such capabilities include proactive redistribution of shares, veri...
متن کاملIdeal Secret Sharing Schemes with Share Selectability
In this paper, we investigate a new concept, called share selectable secret sharing, where no unauthorized set can obtain information of the secret (in the information-theoretic sense) even if shares are selectable as arbitrary values which are independent of the secret. We propose two totally selectable (i.e., all users’ shares are selectable) secret sharing schemes with unanimous structure. W...
متن کاملNew Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size
The Visual Secret Sharing (VSS) scheme proposed by Naor and Shamir is a perfectly secure scheme to share a secret image. By using m sub pixels to represent one pixel, we encrypt the secret image into several noise-like shadow images. The value of m is known as the pixel expansion. More pixel expansion increases the shadow size and makes VSS schemes impractical for real application. In this pape...
متن کاملSharing and hiding secret images with size constraint
This paper presents a method for sharing and hiding secret images. The method is modi/ed from the (t; n) threshold scheme. (Comput.Graph. 26(5)(2002)765) The given secret image is shared and n shadow images are thus generated. Each shadow image is hidden in an ordinary image so as not to attract an attacker’s attention. Any t of the n hidden shadows can be used to recover the secret image. The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ingénierie des systèmes d information
سال: 2020
ISSN: 1633-1311,2116-7125
DOI: 10.18280/isi.250210