Secret Sharing Scheme Based on Cauchy Matrix for Data Outsourcing

被引:0
|
作者
Prasad, Vishnu C. [1 ]
Kumar, Arun Raj P. [1 ]
机构
[1] Natl Inst Technol, Pondicherry, India
关键词
Secret Sharing; Cauchy Matrix;
D O I
10.1145/3136825.3136861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret Sharing schemes have been used for privacy preserving data outsourcing because of the slight advantages in security and speed over encryption based schemes. Data outsourcing using secret share based scheme also result in greater fault-tolerance and data availability at the time of failures. In this paper a secret sharing scheme based on Cauchy matrix is proposed, which can be used for secure data outsourcing. The proposed scheme is compared with Shamir's scheme which is widely used for data outsourcing and it has been found that the latter performs better in share generation phase whereas the former performs better in secret reconstruction phase.
引用
下载
收藏
页码:315 / 318
页数:4
相关论文
共 50 条
  • [31] Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services
    Ohigashi, Toshihiro
    Nishimura, Kouji
    Aibara, Reiji
    Yoshida, Kouta
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 78 - 83
  • [32] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [33] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [34] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [35] A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection
    Chang, Ching-Chun
    Horng, Ji-Hwei
    Shih, Chia-Shou
    Chang, Chin-Chen
    SENSORS, 2020, 20 (13) : 1 - 18
  • [36] Novel and practical scheme based on secret sharing for laptop data protection
    Chang, Chin-Chen
    Chou, Yeh-Chieh
    Sun, Chin-Yu
    IET INFORMATION SECURITY, 2015, 9 (02) : 100 - 107
  • [37] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [38] A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix
    Li, Xiao-Shuang
    Chang, Chin-Chen
    He, Ming-Xing
    Lin, Chia-Chen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) : 453 - 476
  • [39] A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix
    Xiao-Shuang Li
    Chin-Chen Chang
    Ming-Xing He
    Chia-Chen Lin
    Multimedia Tools and Applications, 2020, 79 : 453 - 476