Abstract
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the secret. For positive integers r,s,t,n with r⩽s⩽t⩽n, an (r,s,t,n)–threshold essential secret sharing scheme is an algorithm that decomposes a secret S into n shares, s of which are essential, in a way that authorized subsets are precisely those with at least t members, at least r of whom are essential. This work proposes a lossless linear algebraic (r,s,t,n)–threshold essential secret image sharing scheme that decomposes the secret, S, into equally-sized shares, each of size 1/t the size of S. For each block, B, of S, the scheme assigns to the n participants distinct signature vectors v1,v2,…,vn in the vector space F2αt, where α is a suitable positive integer, typically between 2 and 5, inclusive. These signature vectors must adhere to some admissibility conditions in order to satisfy the secret sharing threshold properties. The decomposition of B into n shares is obtained by partitioning B into t vectors, then computing the share yj of the jth participant (1≤j≤n), as a linear combination of these parts with coefficients from the signature vj. The presented simulations showcase the effectiveness and robustness of the proposed scheme against standard statistical and security attacks. They further demonstrate its superiority with respect to existing schemes.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Verifiable secret sharing with changeable access structure;Discrete Mathematics, Algorithms and Applications;2024-05-03
2. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter;Multimedia Tools and Applications;2023-12-27
3. LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS);IET Image Processing;2023-12-08
4. A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n));CAAI Transactions on Intelligence Technology;2023-10-20