Secure Verifiable Secret Short Sharing Scheme for Multi-Cloud Storage

Author(s):  
Maxim Deryabin ◽  
Nikolay Chervyakov ◽  
Andrei Tchernykh ◽  
Mikhail Babenko ◽  
Nikolay Kucherov ◽  
...  
Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Author(s):  
Cheng Zhang ◽  
Yang Xu ◽  
Yupeng Hu ◽  
J. Wu ◽  
Ju Ren ◽  
...  

2016 ◽  
Vol 96 (4) ◽  
pp. 5295-5314 ◽  
Author(s):  
Xiong Li ◽  
Saru Kumari ◽  
Jian Shen ◽  
Fan Wu ◽  
Caisen Chen ◽  
...  

2017 ◽  
Vol 30 (16) ◽  
pp. e3324 ◽  
Author(s):  
Laicheng Cao ◽  
Wenwen He ◽  
Yufei Liu ◽  
Xian Guo ◽  
Tao Feng

2015 ◽  
Vol 114 (8) ◽  
pp. 10-16
Author(s):  
Megha Mayreddy ◽  
B.Tarakeswara Rao
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Xiaoping Li ◽  
Hefeng Chen ◽  
Yanjun Liu ◽  
Chin-Chen Chang

Multisecret sharing schemes have been widely used in the area of information security, such as cloud storage, group authentication, and secure parallel communications. One of the issues for these schemes is to share and recover multisecret from their shareholders. However, the existing works consider the recovery of multisecret only when the correspondences between the secrets and their shares are definite. In this paper, we propose a multisecret sharing scheme to share and recover two secrets among the participants based on the generalized Chinese Remainder Theorem (GCRT), where the multisecret and their shares are unordered. To overcome the leakage of information, we propose an improved scheme including the improved sharing phase and the recovery phase. The improved scheme has not only a more secure performance but also a lower computation complexity. The conditions for recovery failure and success are also explored.


Author(s):  
Hiroaki Kikuchi ◽  
Kouichi Itoh ◽  
Mebae Ushida ◽  
Yuji Yamaoka ◽  
Takanori Oikawa

Sign in / Sign up

Export Citation Format

Share Document