On secret sharing communication systems with two or three channels

نویسنده

  • Hirosuke Yamamoto
چکیده

permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. 387 Ahsfruct-The source coding problem is considered for secret sharing communication systems (SSCs's) with two or three channels. The SSCS, where the information X is shared and communicated through two or more channels, is an extension of Shannon's cipher communication system and the secret sharing system. The security level is measured with equivocation; that is, (l/N)H(XI&), (l/N)H(XIKq), etc., where & and WJ are the wire-tapped codewords. The achievable rate region for the given security level is established for the SSCS's with two or three channels.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

A coding theorem for secret sharing communication systems with two Gaussian wiretap channels

A coding theorem is proved for the secret sharing communication system (SSCS) with two Gaussian wiretap channels. This communication system is an extension of both the SSCS with two noiseless channels and the Gaussian wiretap channel (GWC). The admissible region of rates and security levels for the SSCS with two GWC’s is described by the capacities and secrecy capacities of two GWC’s.

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Multi-channel Secret Image Transmission with Fast Decoding: by using Bit-level Sharing and Economic-size Shares

To transmit or store an image in a safer way against interceptor, there are at least three possible major approaches: encryption with keys [1]; hiding the image in other media or objects [2-3]; sharing the image among distinct channels/places [4-17]. Mixing these three major branches are also possible. In this paper, we focus on image secret sharing. In an (r,n) image sharing system (r≤n), the ...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 32  شماره 

صفحات  -

تاریخ انتشار 1986