Threshold changeable secret image sharing scheme based on interpolation polynomial

被引:76
|
作者
Liu, Yan-Xiao [1 ]
Yang, Ching-Nung [2 ]
Wu, Chi-Ming [2 ]
Sun, Qin-Dong [1 ]
Bi, Wei [3 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng Township, Hualien County, Taiwan
[3] SeeleTech Corp, San Francisco, CA USA
关键词
Secret image sharing; Threshold changeable; Interpolation polynomial; BOOLEAN-OPERATIONS;
D O I
10.1007/s11042-019-7205-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In previous (k,n) secret image sharing scheme, the threshold k is decided by dealer according to the security requirement, and this threshold value is fixed without considering the dynamic secure environment in future. In this work, we propose a novel threshold changeable secret image sharing scheme where the threshold value can be changed according to the changeable security requirement. In our scheme, each participant only needs to keep one initial shadow. When reconstructing image, the dealer decides the threshold according to security level. If the threshold is unchanged, any k or more initial shadows can recover the image; else if the threshold is increased or decreased, dealer publishes additional information, each participant update their shadows accordingly such that the threshold of updated shadows is changed correspondingly. The contribution of our work is that the threshold of shadows can be changed flexibly to satisfy the dynamic secure environment, and each participant only need to keep one initial shadows. The feature of threshold changeable makes our scheme more practical than previous secret image sharing in some complicated applications.
引用
收藏
页码:18653 / 18667
页数:15
相关论文
共 50 条
  • [21] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [22] Polynomial-Based Secret Sharing Scheme for Text, Image and Audio
    Guttikonda P.
    Mundukur N.B.
    Journal of The Institution of Engineers (India): Series B, 2020, 101 (05): : 609 - 621
  • [23] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [24] A lattice-based changeable threshold, multi-secret sharing scheme and its application to threshold cryptography
    Pilaram, H.
    Eghlidos, T.
    SCIENTIA IRANICA, 2017, 24 (03) : 1448 - 1457
  • [25] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [26] A multi-threshold secret image sharing scheme based on MSP
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    PATTERN RECOGNITION LETTERS, 2012, 33 (12) : 1594 - 1600
  • [27] Threshold Meaningful Secret Image Sharing Scheme Based on QR Code
    Hu, Fei
    Yao, Yuanzhi
    Li, Weihai
    Yu, Nenghai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Threshold changeable secret sharing schemes revisited
    Zhang, Zhifang
    Chee, Yeow Meng
    Ling, San
    Liu, Mulan
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2012, 418 : 106 - 115
  • [29] Simple and efficient threshold changeable secret sharing
    Harn, Lein
    Hsu, Chingfang
    Xia, Zhe
    Xu, Hang
    Zeng, Shuchang
    Pang, Fengling
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [30] A Secret Sharing Shuffling Scheme Based on Polynomial
    Zhang, Xi
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1746 - 1750