Secret sharing scheme using Gray code and XOR operation

被引:0
|
作者
Deepika, M. P. [1 ]
Sreekumar, A. [2 ]
机构
[1] CUSAT, Kochi, Kerala, India
[2] CUSAT, Dept Comp Applicat, Kochi, Kerala, India
关键词
Secret Sharing; Gray code; XOR operation; Encryption scheme; Visual Cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret sharing refers to method for distributing a secret among a group of participants. It is also known as secret splitting. In this, each of the participants is allocated a share of the secret. The individual share doesn't carry any information. The secret can be reconstructed only when a sufficient number or all of shares are combined together. Secret-sharing schemes are important tools in cryptography and they are used as building blocks in many secure protocols, e.g., general protocol for multiparty computation, Byzantine agreement, threshold cryptography, access control, attribute-based encryption, and generalized oblivious transfer. Visual secret sharing, aka Visual Cryptography, provides a very powerful technique by which visual secret can be distributed into two or more shares. When the shares are combined together, the original visual secret can be discovered. In this paper, as first part, many types of secret sharing schemes are examined. Secondly we proposed two variant of a secret sharing scheme using Gray code and XOR operation. The Gray code is used to construct the shares and the XOR operation is used to reconstruct the secret. The proposed method can be used as a cryptographic algorithm and also for secret sharing as well as visual secret sharing.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An updatable XOR secret sharing scheme
    Lv, Chunli
    Zeng, Zichuan
    Zhang, Bo
    Shen, Changhong
    Pei, Bei
    International Agricultural Engineering Journal, 2019, 28 (01): : 354 - 358
  • [2] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (28-29) : 35051 - 35080
  • [3] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Arup Kumar Chattopadhyay
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    Multimedia Tools and Applications, 2021, 80 : 35051 - 35080
  • [4] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation
    Dinesh Pande
    Arjun Singh Rawat
    Maroti Deshmukh
    Maheep Singh
    Wireless Personal Communications, 2023, 130 : 957 - 985
  • [5] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation
    Pande, Dinesh
    Rawat, Arjun Singh
    Deshmukh, Maroti
    Singh, Maheep
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 957 - 985
  • [6] XOR-Based Hierarchical Secret Sharing Scheme
    Shima, Koji
    Doi, Hiroshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 206 - 223
  • [7] XOR-based visual secret sharing scheme using pixel vectorization
    Suresh Prasad Kannojia
    Jasvant Kumar
    Multimedia Tools and Applications, 2021, 80 : 14609 - 14635
  • [8] A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
    Chattopadhyay, Arup Kumar
    Ghosh, Debalina
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 1025 - 1031
  • [9] XOR-based visual secret sharing scheme using pixel vectorization
    Kannojia, Suresh Prasad
    Kumar, Jasvant
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) : 14609 - 14635
  • [10] Secret sharing: using meaningful image shadows based on Gray code
    Ting-Fang Cheng
    Ching-Chun Chang
    Li Liu
    Multimedia Tools and Applications, 2017, 76 : 9337 - 9362