期刊文献+

一种高效的(t,n)门限可视密码方案 被引量:2

Very efficient(t,n) threshold visual secret sharing scheme
下载PDF
导出
摘要 首先提出了一种多秘密共享方案,该方案共享t个多重秘密,需要计算t个联立方程。然后基于多秘密共享的思想,提出了一种新的(t,n)门限可视密码方案。该方案把一幅秘密图像分割成t幅子秘密图像,每幅子秘密图像是原始图像的1/t;然后再由t幅子秘密图像计算出n幅共享图像,秘密送给n个参与者,其中每个共享图像与子秘密图像同样大小。使得任意t个或更多的参与者合作能够恢复原始秘密图像,而任意少于t个参与者却得不到有关原始图像的任何信息。另外,恢复的图像和秘密图像完全一样,没有任何失真。新方案安全、有效,是一种完备的(t,n)门限方案,适用于把黑白、灰度、彩色图像作为秘密进行共享。 This article firstly proposes a multi-secret sharing scheme,which will share t secrets and needs to solve t simultaneous equations.Then based on the multi-secret sharing ideal,we present a new (t,n)-threshold visual secret sharing scheme.The scheme splits a secret image into t sub-secret images,in which each sub-secret image's size is 1/t of the original secret image; and then by t sub-secret images,computes n sharing images sent secretly n participants as the shares,which are the same size as the sub-secret images.So that any t or more shares can recover the secret image,but any t-1 or fewer of them gain no information about the original image.In addition,the recovered image is the same as the original secret image and there is no loss of the secret.The new scheme is secure and very efficient,which is a perfect (t,n)-threshold scheme to share b&w,gray-level or color images in a secret way.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第23期35-37,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60573171) 安徽省自然科学基金(the Natural Science Foundation of Anhui Province of China under Grant No.070412051) 安徽高校省级重点自然科学研究项目(No.KJ2007A043 No.2007JYXM020) 安徽大学人才队伍建议经费
关键词 可视密码 秘密共享 门限方案 多秘密 完备 visual cryptography secret sharing threshold schemes multi-secret perfect
  • 相关文献

参考文献16

  • 1Shamir A.How to share a secret[J].Commun of the ACM,1979,22(11):612-613. 被引量:1
  • 2Blakley G R.Safeguarding cryptographic keys[C]//AFIPS Conference Proceedings,1979,48:313-317. 被引量:1
  • 3He J,Dawson E.Multistage secret sharing based on one-way function[J].Electronics Letters,1994,30 (19):1591-1592. 被引量:1
  • 4Harn L.Comment:multistage secret sharing based on one-way function[J].Electronics Letters,1995,31 (4):262. 被引量:1
  • 5Harn L.Efficient sharing (broadcasting) of multiple secrets[J].IEE Proceedings -Computers and Digital Techniques,1995,142 (3):237-240. 被引量:1
  • 6He J,Dawson E.Multisecret-sharing scheme based on one-way function[J].Electronics Letters,1995,31 (2):93-95. 被引量:1
  • 7Chien H-Y,Jan J-K,Tseng Y-M.A practical (t,n) multi-secret sharing scheme[J].IEICE Transactions on Fundamentals,2000,E83-A (12):2762-2765. 被引量:1
  • 8Naor M,Shamir A.Visual cryptography[C]//LNCS 950:Advances in Cryptology-Eurocrypt'94,1995:1-12. 被引量:1
  • 9Lin C,Tsai W.Visual cryptography for gray-level images by dithering techniques[J].Pattern Recognition,2003,24:349-358. 被引量:1
  • 10Thien C,Lin J.Secret image sharing[J].Computers and Graphics,2002,26:765-770. 被引量:1

二级参考文献11

  • 1Blakley G R.Safeguarding cryptographic keys[A].Proceeding of AFIPS 1979 National Computer Conference[C].Reston:American Federation of Information Processing Societies,1979.313-317. 被引量:1
  • 2Shamir A.How to share a secret[J].Commun of the ACM,1979,22:612-613. 被引量:1
  • 3Ito M,Saito A,Nishizcki T.Secret sharing scheme realizing general access structure[A].Proceedings of IEEE Globecom'87[C].Tokyo,1987.99-102. 被引量:1
  • 4Benaloh J C,Leichter J.Generalized secret sharing and monotone functions[A].Goldwasser S.Avdances in Cryptology-Crypto' 88,LNCS 403[C].Heidelberg:Springer-Verlag,1990.27-35. 被引量:1
  • 5Herzberg A,Jarecki S,Krawczyk H,et al.Proactive secret sharing or:How to cope with perpetual leakage[A].Coppersmith D.Advances in Cryptology-Crypto'95,the 15th Annual International Cryptology Conference[C].Heidelberg:Springeer-Verlag,1995.457-469. 被引量:1
  • 6Canetti R Gennaro R,Herzberg A,et al.Proactive security:long-term protection against break-ins[J].CryptoBytes,1997,3(1):1-8. 被引量:1
  • 7Jarecki.Proactive secret sharing and public key cryptosystems[D].Cambridge:Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,1995. 被引量:1
  • 8P Feldman.A practical scheme for non-interactive verifiable secret sharing[A].Proceedings of the 28th Annual IEEE Symposium on Foundation of Computer Science[C].New York:IEEE Computer Society Press,1987.427-437. 被引量:1
  • 9Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[A].Davies D W.Advances in Cryptology-Crypto'91[C].Berlin:SpringerVerlag,1991.129-140. 被引量:1
  • 10Menezes A J,van Oorschot P C,Wanstone S A.Handbook of Applied Cryptography[M].London:CRC Press 1996.490-530. 被引量:1

共引文献3

同被引文献12

  • 1周琳娜,杨义先,郭云彪,胡岚.基于二值图像的信息隐藏研究综述[J].中山大学学报(自然科学版),2004,43(A02):71-75. 被引量:16
  • 2田会方,张洪昌.计算机汉字库开发液晶汉字显示数据的方法[J].武汉理工大学学报(信息与管理工程版),2005,27(4):83-86. 被引量:5
  • 3Naor M,Shamir A.Visual cryptography[C]//Lecture Notes in Computer Science 950:Advance in Cryptography,Eurocrypt'94.Springer- Verlag, 1995:1-12. 被引量:1
  • 4Adhikari A,Dutta T K,Roy B.A new black and white visual cryptographic scheme for general acess structures[C]//Canteaut A,Viswanathan K.LNCS 3348:Progress in Cryptology-INDOCRYPT 2004. Springer-Verlag, 2005 : 399-413. 被引量:1
  • 5Yang Chung-Nung,Laih Chi-Sung, New (k,k) visual secret sharing schemes using hierarchical structure technique[C/OL].1998 International Computer Symposium Workshop on Cryptology and Information Security December17-19, 1998.[2006-10-20].http://hdl.handie.net/2377/2053. 被引量:1
  • 6Bitner J R,Ehrlich G,Reingold E M.Efficient generation of the binary reflected Gray code[J].Communications of the ACM, 1976, 19(9):517-521. 被引量:1
  • 7Ateniese G,Blundo C,Santis A D,et al.Visual cryptography for general access structures[J].Information and Computation, 1996,129 (2):86-106. 被引量:1
  • 8Koga H.A general formula of the (t,n)-threshold visual secret sharing scheme[C]//Lecture Notes in Computer Science:Advances in Cryptology-ASIACRYPT 2002.Springer-Verlag,2002,2501:847- 855. 被引量:1
  • 9Kandoi S,Sourabh S.Threshold schemes in visual secret sharing [EB/OL]. [2008 -07].http://home.iitk.ac.in/-skandoi/Threshold -Schemes-in-Visual-Secret-Sharing. 被引量:1
  • 10Ateniese G,Blundo C,De Santis A,et al.Constructions and bounds for visual cryptography[C]//Lecture Notes in Computer Science :Proc 23rd International Colloquium on Automata,Languages and Programming.[S.l.] : Springer-Verlag, 1996,1099 : 416-428. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部