An updatable XOR secret sharing scheme

被引:0
|
作者
Lv, Chunli [1 ]
Zeng, Zichuan [1 ]
Zhang, Bo [1 ]
Shen, Changhong [2 ]
Pei, Bei [3 ]
机构
[1] College of Information and Electrical Engineering, China Agricultural University, Beijing,100083, China
[2] School of Computer Science & Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Third Institute of Public Security, Shanghai,200031, China
来源
关键词
Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
The secret sharing scheme for large data scattered storage needs to solve two problems: one is the confidentiality problem in long storage, that is, to prevent the external adversaries from stealing secrets; second is for a large number of data sharing and updating operations including secret sharing and refactoring efficiency, and the amount of traffic and efficiency during updating. The existing secret sharing scheme cannot solve the above problems at the same time. To fill the research gap, an active secret sharing algorithm for updates was designed based on the exclusive or secret scheme of Lv and pseudo random sequence, which has the following advantages: first of all, it is worth emphasizing that update is the unpredictable operation. One is that each participant completes their share updating automatically with the premise of ensuring the credibility. The other is updating some quota blocks randomly under the premise of blocking. Secondly, the unpredictable updating operation can effectively prevent opponents from speculating the updated law. Last but not least, it is suitable for the storage area. © 2019, Asian Association for Agricultural Engineering. All rights reserved.
引用
收藏
页码:354 / 358
相关论文
共 50 条
  • [1] XOR-Based Hierarchical Secret Sharing Scheme
    Shima, Koji
    Doi, Hiroshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 206 - 223
  • [2] XOR Based Secret Image Sharing Scheme with Security Improvement
    Ratnam, Javvaji V. K.
    Reddy, T. Sreenivasulu
    Reddy, P. Ramana
    HELIX, 2018, 8 (05): : 3588 - 3592
  • [3] Secret sharing scheme using Gray code and XOR operation
    Deepika, M. P.
    Sreekumar, A.
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [4] XOR-based unexpanded meaningful visual secret sharing scheme
    Kannojia S.P.
    Kumar J.
    International Journal of Security and Networks, 2019, 14 (01) : 1 - 9
  • [5] XOR-based visual secret sharing scheme using pixel vectorization
    Suresh Prasad Kannojia
    Jasvant Kumar
    Multimedia Tools and Applications, 2021, 80 : 14609 - 14635
  • [6] A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
    Chattopadhyay, Arup Kumar
    Ghosh, Debalina
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 1025 - 1031
  • [7] XOR-based visual secret sharing scheme using pixel vectorization
    Kannojia, Suresh Prasad
    Kumar, Jasvant
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) : 14609 - 14635
  • [8] Verifiable XOR-based visual secret sharing scheme for hyperspectral images
    Srujana, Oruganti Sai
    Mhala, Nikhil C.
    Pais, Alwyn R.
    JOURNAL OF APPLIED REMOTE SENSING, 2021, 15 (01)
  • [9] Lossless Multiple Image Secret Sharing Scheme using XOR & Additive Modulo Arithmetic
    Ovhal, Shilpa Babruwahan
    Kharat, Reena
    Naidu, P. Sanyasi
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [10] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,