Cheater identifiable visual secret sharing scheme

被引:1
|
作者
Gan Zhi & Chen Kefei1. Computer Science Department
机构
关键词
visual cryptography; secret sharing; VSS;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.
引用
收藏
页码:233 / 236
页数:4
相关论文
共 50 条
  • [1] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [2] Cheater identification in secret sharing scheme
    Shi, Ronghua
    Hu, Xiangling
    Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 2000, 29 (01): : 38 - 40
  • [3] Note on Some Recent Cheater Identifiable Secret Sharing Schemes
    Xu, Rui
    Morozov, Kirill
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (08) : 1814 - 1819
  • [4] Cheater-identifiable homomorphic secret sharing for outsourcing computations
    Yan He
    Liang Feng Zhang
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5103 - 5113
  • [5] Cheater-identifiable homomorphic secret sharing for outsourcing computations
    He, Yan
    Zhang, Liang Feng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5103 - 5113
  • [6] A dynamic secret sharing scheme with cheater detection
    Hwang, SJ
    Chang, CC
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 48 - 55
  • [7] Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
    Obana, Satoshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 284 - 302
  • [8] t-Cheater identifiable (k,n) threshold secret sharing schemes
    Kurosawa, K
    Obana, S
    Ogata, W
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 410 - 423
  • [9] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [10] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010