A secret sharing scheme based on integer decomposition and hexagonal structure

被引:0
|
作者
Rouia Z. [1 ]
Lemnouar N. [1 ]
Rida A.M. [1 ]
机构
[1] LAMIE Laboratory, Department of Computer Science, Faculty of Mathematics and Computer Science
关键词
bio-inspired hexagonal structure; isoperimetry; quasi-square decomposition; secret sharing;
D O I
10.1504/IJICT.2024.138784
中图分类号
学科分类号
摘要
Security is a major challenge in storage and transmission of digital data. Secret sharing scheme is a fundamental primitive used in multiparty computations, access control and key management, which is based here on two concepts, namely: hexagonal structure and integer decomposition. Use of hexagonal structure is common in biological modelling. For integer decomposition, the oldest known method is Fermat’s factorisation, while for the proposed decomposition, the factorisation uniqueness of positive integer into two factors is exploited. Experimental results obtained from the applied scheme to digital images reveal interesting properties; this scheme turns out to be lossless, ideal, flexible, extensible, and even can detect and identify cheater; in sum, it has a good security. © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:482 / 501
页数:19
相关论文
共 50 条
  • [1] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448
  • [2] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    Chinese Journal of Electronics, 2023, 32 (03) : 556 - 563
  • [3] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563
  • [4] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [5] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [6] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [7] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [8] A quantum secret sharing scheme on access structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) : 186 - 191
  • [9] A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
    Rashkolia, A. Saeidi
    Zahedi, M. M.
    Dehkordi, M. H.
    IRANIAN JOURNAL OF FUZZY SYSTEMS, 2018, 15 (04): : 1 - 11
  • [10] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    International Journal of Information Security, 2009, 8