An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure

被引:1
|
作者
Lee, Ching-Fan [1 ]
Juan, Justie Su-Tzu [1 ]
机构
[1] Natl Chi Nan Univ, Dept Comp Sci & Informat Engn, Puli 54561, Nantou, Taiwan
关键词
(t; n)-threshold secret sharing scheme; multi-secret; multi-use; share; general access structure;
D O I
10.1109/SSIRI.2009.22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 2008, Shi et al. proposed a new (t, n)-threshold secret sharing scheme for image encryption. This paper indicates that their scheme is insecure because it is possible to find the secret image from the public image. In addition, it is inflexible since the width must be equal to the height and the size of the secret images must be the same upon sharing multi-image. Moreover, their scheme is not efficient enough. For these reasons, we propose two new schemes to avoid secret images that can be found from the public image and the width and height of secret image can be decided flexibly. Finally, the proposed schemes not only achieve some properties such as multi-secret images, multiuse, and the number of shares that are held by each participant is just one but also can be used for any general access structure in this paper.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [1] An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
    PANG Liaojun~ 1
    2. School of Computer Science
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1649 - 1652
  • [2] Highly efficient and secure multi-secret image sharing scheme
    Chen, Chien-Chang
    Wu, Wei-Jie
    Chen, Jun-Long
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (12) : 7113 - 7128
  • [3] Highly efficient and secure multi-secret image sharing scheme
    Chien-Chang Chen
    Wei-Jie Wu
    Jun-Long Chen
    Multimedia Tools and Applications, 2016, 75 : 7113 - 7128
  • [4] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [5] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [6] Computationally Secure Robust Multi-secret Sharing for General Access Structure
    Das, Angsuman
    Roy, Partha Sarathi
    Adhikari, Avishek
    MATHEMATICS AND COMPUTING, 2015, 139 : 123 - 134
  • [7] Multi-Use Multi-Secret Sharing Scheme for General Access Structure
    Roy, Partha Sarathi
    Adhikari, Avishek
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (04): : 50 - 57
  • [8] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [9] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [10] A Secure and Efficient (t, n) Multi-Secret Sharing Scheme
    PANG Liao-jun
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 191 - 194