A (n, n)-threshold Secret Sharing Scheme for Barcode Application

被引:0
|
作者
Lin, Pei-Yu [1 ,2 ]
Chen, Yi-Hui [3 ]
Chuang, Jun-Chou [4 ]
机构
[1] Yuan Ze Univ, Dept Informat Commun, Taoyuan, Taiwan
[2] Yuan Ze Univ, Innovat Ctr Big Data & Digital Convergence, Taoyuan, Taiwan
[3] Asia Univ, Dept Appl Informat & Multimedia, Taichung, Taiwan
[4] Providence Univ, Dept Comp Sci & Commun Engn, Taichung, Taiwan
关键词
Secret sharing; QR barcode; cheater detection;
D O I
10.3233/978-1-61499-484-8-1023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A secret sharing system based upon two-dimensional QR barcode is proposed in this article. The proposed approach utilizes the QR characteristics to achieve secret sharing and can resist the print and scan operation. General browsers can read the original data from the marked QR tag via barcode reader. Only the authorized participants can cooperate to reveal the lossless secret. According to the experiments, the new secret sharing approach can satisfy the content readability and cheater detectability of the QR barcode.
引用
收藏
页码:1023 / 1028
页数:6
相关论文
共 50 条
  • [1] A Fair (t,n) Threshold Secret Sharing Scheme
    Xing, Minhong
    Li, Wenmin
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
  • [2] Fair (t, n) threshold secret sharing scheme
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Jiang, Qi
    [J]. IET INFORMATION SECURITY, 2013, 7 (02) : 106 - 112
  • [3] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [4] On a fast (k,n)-threshold secret sharing scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2365 - 2378
  • [5] A scheme for (t, n) threshold secret image sharing
    Chan, Chao-Wen
    Chang, Thin-Chen
    [J]. IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 619 - +
  • [6] Proactive (k, n) threshold secret sharing scheme with variant k and n
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Chen, Pin-You
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 117 - 120
  • [7] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    [J]. Journal of Electronics(China), 2006, (05) : 731 - 735
  • [8] An efficient (t,n)-threshold secret image sharing scheme
    Kanso, Ali
    Ghebleh, Mohammad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16369 - 16388
  • [9] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    [J]. JournalofElectronics., 2006, (05) - 735
  • [10] A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
    Fulin Li
    Tingyan Chen
    Shixin Zhu
    [J]. International Journal of Theoretical Physics, 62