Author:
Hidayat Anneke Soraya,Lee Gil-Je,Yoon Eun-Jun,Yoo Kee-Young
Abstract
Purpose
The detection of an adversary in secret image sharing has been a problematic side in the reconstruction phase. Some of verifiable secret sharing solutions have been proposed to solve the problem. However, there is some computational limitation in the previous schemes. The purpose of this paper is to analyze the importance of consistency for detecting an adversary in a secure reconstruction phase. Strong t-consistency assures the correctness of reconstructed secret as long as participants P ∈ N and n(P) = t. Consistency is a solution for preventing the participant to be absent and helps the dealer to easily detect the adversary without an additional verification step.
Design/methodology/approach
This paper focuses on secure reconstruction, and uses two different approaches, namely, single-secret and multi-secret, to experiment the relationship between the given variable (t,m,n) and the adversaries by observing the quality test result, polynomial approach and visualization.
Findings
The results show that t and m are inversely proportional to the image quality without respect to the polynomial approach. The reconstruction phase is declared as securely conducted when m = 2t − 1, for both single- and multi-secret approaches.
Originality/value
The application of consistency is a considerable step for securing the secret from an adversary by combining the reconstruction phase and the consistency combination at once, removing the need for additional separate verification steps for decreasing the computational time, especially in secret image sharing.
Subject
General Computer Science,Theoretical Computer Science
Reference26 articles.
1. Anon. (2009), “Explorable.com: statistical correlation”, available at: https://explorable.com/statistical-correlation (accessed 10 August 2015).
2. A modular approach to key safeguarding;IEEE Transactions on Information Theory,1983
3. Secret-sharing schemes: a survey,2011
4. Safeguarding cryptographic keys,1979
5. Secret image sharing: a Boolean-operations-based approach combining benefits of polynomial-based and fast approaches;International Journal of Pattern Recognition and Artificial Intelligence,2009