Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme

被引:2
|
作者
Sun, Qindong [1 ,2 ]
Cao, Han [2 ,3 ]
Li, Shancang [4 ]
Song, Houbing [5 ]
Liu, Yanxiao [3 ,6 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xi'an, Peoples R China
[2] Xian Univ Technol, Shaanxi Key Lab Network Comp & Secur, Xi'an, Peoples R China
[3] Xian Univ Technol, Dept Comp Sci & Engn, Xi'an, Peoples R China
[4] Univ West England, Dept Comp Sci & Creat Technol, Bristol, England
[5] Embry Riddle Aeronaut Univ, Dept Elect Comp Software & Syst Engn, Daytona Beach, FL USA
[6] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
关键词
secret sharing scheme; secret image sharing; threshold changeable; bivariate polynomial; STEGANOGRAPHY;
D O I
10.3390/math10050710
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Secret image sharing (SIS) is an important application of the traditional secret sharing scheme, which has become popular in recent years. In an SIS scheme, a confidential image is encrypted into a group of shadows. Any set of shadows that reaches the threshold can reconstruct the image; otherwise, nothing can be recovered at all. In most existing SIS schemes, the threshold on shadows for image reconstruction is fixed. However, in this work, we consider more complicated cases of SIS, such that the threshold is changeable according to the security environment. In this paper, we construct a (k & LRARR;h,n) threshold-changeable SIS (TCSIS) scheme using a bivariate polynomial, which provides h-k+1 possible thresholds, k,k+1, horizontal ellipsis ,h. During image reconstruction, each participant can update their shadow according to the current threshold T based only on their initial shadow. Unlike previous TCSIS schemes, the proposed scheme achieves unconditional security and can overcome the information disclosure problem caused by homomorphism.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Secret Image Sharing Scheme Based on Bivariate Polynomial
    Tang, Dan
    Huang, Jian
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 193 - 195
  • [2] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Yan-Xiao Liu
    Ching-Nung Yang
    Chi-Ming Wu
    Qin-Dong Sun
    Wei Bi
    [J]. Multimedia Tools and Applications, 2019, 78 : 18653 - 18667
  • [3] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Wu, Chi-Ming
    Sun, Qin-Dong
    Bi, Wei
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18653 - 18667
  • [4] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Lein Harn
    Ching-Fang Hsu
    [J]. Wireless Personal Communications, 2017, 95 : 1495 - 1504
  • [5] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504
  • [6] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    [J]. 2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [7] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Fulin Li
    Yang Liu
    Jiayun Yan
    Shixin Zhu
    [J]. Cryptography and Communications, 2022, 14 : 1039 - 1053
  • [8] Two-Qubit Quantum Secret Sharing Scheme based on Symmetric Bivariate Polynomial
    Kumar, Manoj
    Hardeep
    Gupta, Pratik
    [J]. IAENG International Journal of Applied Mathematics, 2024, 54 (11) : 2470 - 2476
  • [9] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Li, Fulin
    Liu, Yang
    Yan, Jiayun
    Zhu, Shixin
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1039 - 1053
  • [10] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29