CFP last date
20 May 2024
Reseach Article

General Access Structure Secret Sharing in Matrix Projection

by Sonali Patil, Prashant Deshmukh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 13
Year of Publication: 2014
Authors: Sonali Patil, Prashant Deshmukh
10.5120/18809-0369

Sonali Patil, Prashant Deshmukh . General Access Structure Secret Sharing in Matrix Projection. International Journal of Computer Applications. 107, 13 ( December 2014), 6-9. DOI=10.5120/18809-0369

@article{ 10.5120/18809-0369,
author = { Sonali Patil, Prashant Deshmukh },
title = { General Access Structure Secret Sharing in Matrix Projection },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 13 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number13/18809-0369/ },
doi = { 10.5120/18809-0369 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:56.688499+05:30
%A Sonali Patil
%A Prashant Deshmukh
%T General Access Structure Secret Sharing in Matrix Projection
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 13
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Secret Sharing is a technique which provides security to confidential images by dispersed storages. General access structure image secret sharing provides flexibility for deciding qualified subsets of participants which can reconstruct the original secret image. Non qualified subsets of participants cannot get any information about original secret image. This paper proposes general access structure image secret sharing based on matrix projection. The experimental results show high accuracy, high security and less overhead in the network due to highly reduced size of image shares.

References
  1. Shamir, A. , "How to Share a Secret", Communications of the ACM, vol. 22, no. 11, 1979.
  2. G. Blakely, "Safeguarding cryptographic keys", presented at the Proceedings of the AFIPS 1979 National Computer Conference, vol. 48, Arlington, VA, pp. 313–317, 1997.
  3. Sonali Patil, Prashant Deshmukh "An Explication of Multifarious Secret Sharing Schemes"International Journal of Computer Applications (0975 – 8887) Volume 46– No. 19, May 2012.
  4. Mitsuru Ito, Akira Saito, Takao Nishizeki, "Secret Sharing Scheme: Realizing General Access Structure", GLOBECOM IEEE 1987.
  5. J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In Proc. of CRYPTO '88, volume 403 of LNCS, pages 27–35. Springer-Verlag, 1990.
  6. K. Srinathan, N. Tharani Rajan, and C. Pandu Rangan, "Non-perfect secret sharing over general access structures," in INDOCRYPT, pp. 409–421, 2002.
  7. Pang, L. -J. , Li, H. -X. , Wang, Y. -M. , "A secure and efficient secret sharing scheme with general access structures", Lecture Notes in Computer Science v 4223 LNAI, Fuzzy Systems and Knowledge Discovery - Third International Conference, FSKD, Proceeding pp. 646-649, 2006.
  8. Surjadi Slamet, Kiki Ariyanti Sugeng, Mirka Miller "Sum Graph Based Access Structure In a Secret Sharing Scheme" Journal of Prime Research in Mathematics Vol. 2, 1113-119, 2006.
  9. S. Iftene, "General secret sharing based on the Chinese remainder theorem with applications in e-voting", Electronic Notes in Theoretical Computer Science, vol. 186, pp. 67–84, 2007.
  10. WEI Yun, ZHONG Pucha, "A multi-stage secret sharing scheme with general access structures", IEEE 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2008.
  11. Sai-zhi Ye, Guo-xiang Yao, Quan-long Guan, "A multiple secret sharing scheme with general access structure, International Symposium on Intelligent Ubiquitous Computing and Education, 2009 IEEE.
  12. Sun Hua and Wang Aimin ," A Multi-Secret Sharing Scheme with General Access Structures based on Elliptic Curve" 3rd International Conference on Advanced Computer Theory and Engineering 2010 IEEE
  13. Cheng Guo and Chin Chen Chang, "A Construction for Secret Sharing Scheme with General Access Structure", Journal of Information Hiding and Multimedia Signal Processing, Vol. 4, Number 1, pp. 1-8, 2013
  14. Ching-Fang Hsu, Bing Zeng, Qi Cheng, "A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures", Journal Of Communications And Networks, Vol. 15, NO. 4, pp. 407-409, AUGUST 2013
  15. V P Binu, A Sreekumar, "An Epitome of Multi Secret Sharing Schemes for General Access Structure", International Journal of Information Processing, vol. 8, Issue 2, pp. 13-28, 2014.
  16. V. P. Binu, A. Sreekumar, "Efficient Multi Secret Sharing with Generalized Access Structures", International Journal of Computer Applications, vol. 90, 2014
  17. O. Farras, C. Padro, Xing Chaoping, An Yang, "Natural Generalizations of Threshold Secret Sharing", IEEE transaction on Information Theory, vol. 60, Issue 3, pp. 1652-1664, 2014.
  18. Li Bai, "A strong ramp secret sharing scheme using matrix projection," presented at the Second International Workshop on Trust, Security and Privacy for Ubiquitous Computing, Niagara-Falls, Buffalo, NY, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security General Access Structure Secret Sharing Information Security Cryptography