Secret Sharing Scheme Based on Cauchy Matrix for Data Outsourcing

被引:0
|
作者
Prasad, Vishnu C. [1 ]
Kumar, Arun Raj P. [1 ]
机构
[1] Natl Inst Technol, Pondicherry, India
关键词
Secret Sharing; Cauchy Matrix;
D O I
10.1145/3136825.3136861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret Sharing schemes have been used for privacy preserving data outsourcing because of the slight advantages in security and speed over encryption based schemes. Data outsourcing using secret share based scheme also result in greater fault-tolerance and data availability at the time of failures. In this paper a secret sharing scheme based on Cauchy matrix is proposed, which can be used for secure data outsourcing. The proposed scheme is compared with Shamir's scheme which is widely used for data outsourcing and it has been found that the latter performs better in share generation phase whereas the former performs better in secret reconstruction phase.
引用
下载
收藏
页码:315 / 318
页数:4
相关论文
共 50 条
  • [1] A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
    Muhammad, Yusuf Idris
    Kaiiali, Mustafa
    Habbal, Adib
    Wazan, A. S.
    Ilyasu, Auwal Sani
    ENTERPRISE INFORMATION SYSTEMS, 2016, 10 (09) : 1001 - 1023
  • [2] Outsourcing secret sharing scheme based on homomorphism encryption
    Zhang, En
    Peng, Jie
    Li, Ming
    IET INFORMATION SECURITY, 2018, 12 (01) : 94 - 99
  • [3] A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
    Rahmani, Peyman
    Taheri, Mohammad
    Fakhrahmad, Seyed Mostafa
    IET COMMUNICATIONS, 2023, 17 (07) : 775 - 789
  • [4] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [5] Resolving a common vulnerability in secret sharing scheme-based data outsourcing schemes
    Ghasemi, Reza
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (02):
  • [6] New attacks on secret sharing-based data outsourcing: toward a resistant scheme
    Peyman Rahmani
    Seyed Mostafa Fakhrahmad
    Mohammad Taheri
    The Journal of Supercomputing, 2022, 78 : 15749 - 15785
  • [7] New attacks on secret sharing-based data outsourcing: toward a resistant scheme
    Rahmani, Peyman
    Fakhrahmad, Seyed Mostafa
    Taheri, Mohammad
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (14): : 15749 - 15785
  • [8] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [9] Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
    Zhang, En
    Zhu, Jun-Zhe
    Li, Gong-Li
    Chang, Jian
    Li, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [10] A Multiple Threshold For Image Secret Sharing Based On Cauchy Matrix
    Yuan, Qizhao
    Cai, Hongliang
    2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, : 742 - 747