期刊文献+

可验证图像秘密共享方案

Verifiable secret image sharing scheme
下载PDF
导出
摘要 提出了一种可验证的图像秘密共享方案。由于秘密份额由参与者自己选取,该方案可防止原始图像持有者和参与者的欺诈;不需要安全信道,降低了系统代价;影子图像小于原始图像,且参与者的秘密份额可以重用。在不可能存在安全信道的系统中该方案可以得到广泛应用。 This paper proposed a verifiable secret image sharing scheme. The new scheme could identify the cheaters no matter if she/he was the dealer or the participant because each participant chooses her/his own shadow by her/himself; the new system didn't need a security channel and the cost of the system could be lowered ; the size of the shadow image was smaller than the secret image ; the new scheme was also a multi-use scheme. The properties are useful in the system which exists a security channel impossibly.
出处 《计算机应用研究》 CSCD 北大核心 2008年第1期254-256,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金研究计划项目(2004A14) 陕西师范大学研究生培养创新基金(2006CXS018)
关键词 图像处理 密码学 秘密共享 可验证性 安全信道 image processing cryptography secret sharing verification security channel
  • 相关文献

参考文献12

  • 1SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. 被引量:1
  • 2BLAKLEY G.Safeguarding cryptographic keys[C]//Proc of AFIPS 1979 National Computer Conference.New York:AFIPS Press,1979:313-317. 被引量:1
  • 3NAOR M,SHAMIR A.Visual cryptography[J].Lecture Notes in Computer Science,1995,950(1):1-12. 被引量:1
  • 4ZHAO Jian-jie,ZHANG Jian-zhong,ZHAO Rong.A practical verifiable multi-secret sharing scheme[J].Computer Standards & Interfaces,2007,29(1):138-141. 被引量:1
  • 5SATYANARAYANAN M.Pervasive computing:vision and challenges[J].IEEE Personal Communications,2001,8(8):10-17. 被引量:1
  • 6CAMPBELL R,AL-MUHTADI J,NALDURG P,et al.Towards security and privacy for pervasive computing[C]//Proc of International Symposium on Software Security.Tokyo:[s.n.],2002:8-10. 被引量:1
  • 7BLUNDO C,De SANTIS A,NAOR M.Visual cryptography for grey level images[J].Information Processing Letters,2000,75(6):255-259. 被引量:1
  • 8THIEN C,LIN J.Secret image sharing[J].Comput Graphics,2002,26(1):765-770. 被引量:1
  • 9WANG Ran-zan,SU Chin-hui.Secret image sharing with smaller shadow images[J].Pattern Recognition letters,2006,27:551-555. 被引量:1
  • 10GAREY M,JOHNSON D.Computers and intractability:a guide to the theory of NP-completeness[M].[S.l.]:W H Freeman and Co,1979. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部