A secret sharing scheme based on integer decomposition and hexagonal structure

被引:0
|
作者
Rouia Z. [1 ]
Lemnouar N. [1 ]
Rida A.M. [1 ]
机构
[1] LAMIE Laboratory, Department of Computer Science, Faculty of Mathematics and Computer Science
关键词
bio-inspired hexagonal structure; isoperimetry; quasi-square decomposition; secret sharing;
D O I
10.1504/IJICT.2024.138784
中图分类号
学科分类号
摘要
Security is a major challenge in storage and transmission of digital data. Secret sharing scheme is a fundamental primitive used in multiparty computations, access control and key management, which is based here on two concepts, namely: hexagonal structure and integer decomposition. Use of hexagonal structure is common in biological modelling. For integer decomposition, the oldest known method is Fermat’s factorisation, while for the proposed decomposition, the factorisation uniqueness of positive integer into two factors is exploited. Experimental results obtained from the applied scheme to digital images reveal interesting properties; this scheme turns out to be lossless, ideal, flexible, extensible, and even can detect and identify cheater; in sum, it has a good security. © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:482 / 501
页数:19
相关论文
共 50 条
  • [41] A Matrix-Based Secret Sharing Scheme for Images
    del Rey, A. Martin
    PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS AND APPLICATIONS, PROCEEDINGS, 2008, 5197 : 635 - 642
  • [42] Rational secret sharing scheme based on Markov decision
    Tian, You-Liang
    Wang, Xue-Mei
    Liu, Lin-Fang
    Tongxin Xuebao/Journal on Communications, 2015, 36 (09): : 222 - 229
  • [43] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [44] An asymmetric multicast fingerprinting scheme based on secret sharing
    Ren Yanzhen
    Hu RuiMin
    Ai Haojun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 211 - 214
  • [45] A new ideal secret sharing scheme based on a tree
    Meriem, Ghanem
    Bouroubi, Sadek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01): : 121 - 138
  • [46] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [47] Implementations of a Hash Function Based Secret Sharing Scheme
    Chum, Chi Sing
    Zhang, Xiaowen
    JOURNAL OF APPLIED SECURITY RESEARCH, 2015, 10 (04) : 525 - 542
  • [48] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [49] New secret sharing scheme based on linear code
    Tan X.
    Wang Z.
    Applied Mathematics-A Journal of Chinese Universities, 2004, 19 (2) : 160 - 166
  • [50] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138