An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure

被引:1
|
作者
Lee, Ching-Fan [1 ]
Juan, Justie Su-Tzu [1 ]
机构
[1] Natl Chi Nan Univ, Dept Comp Sci & Informat Engn, Puli 54561, Nantou, Taiwan
关键词
(t; n)-threshold secret sharing scheme; multi-secret; multi-use; share; general access structure;
D O I
10.1109/SSIRI.2009.22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 2008, Shi et al. proposed a new (t, n)-threshold secret sharing scheme for image encryption. This paper indicates that their scheme is insecure because it is possible to find the secret image from the public image. In addition, it is inflexible since the width must be equal to the height and the size of the secret images must be the same upon sharing multi-image. Moreover, their scheme is not efficient enough. For these reasons, we propose two new schemes to avoid secret images that can be found from the public image and the width and height of secret image can be decided flexibly. Finally, the proposed schemes not only achieve some properties such as multi-secret images, multiuse, and the number of shares that are held by each participant is just one but also can be used for any general access structure in this paper.
引用
收藏
页码:253 / 259
页数:7
相关论文
共 50 条
  • [41] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [42] Efficient Multi-secret Sharing Scheme Using Room Square
    Li, Ming-Jheng
    Chang, Ying-Hsuan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 260 - 266
  • [43] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [44] An efficient (t, n)-threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Zhong Hong
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 580 - +
  • [45] Efficient multi-secret image sharing based on Boolean operations
    Chen, Tzung-Her
    Wu, Chang-Sian
    SIGNAL PROCESSING, 2011, 91 (01) : 90 - 97
  • [46] Multi-secret Sharing Scheme for Level-Ordered Access Structures
    Tentu, Appala Naidu
    Basit, Abdul
    Bhavani, K.
    Venkaiah, V. Ch
    NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 267 - 278
  • [47] Quantum multi-secret sharing scheme with access structures and cheat identification
    Rathi, Deepa
    Kumar, Sanjeev
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2024, 22 (07)
  • [48] A verifiable multi-secret image sharing scheme based on DNA encryption
    Chattopadhyay A.K.
    Saha S.
    Nag A.
    Singh J.P.
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [49] Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
    Nag, Amitava
    Choudhary, Soni
    Dawn, Subham
    Basu, Suryadip
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 337 - 343
  • [50] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110