All-in-one visual and computer decoding of multiple secrets: translated-flip VC with polynomial-style sharing

2017 ◽  
Vol 56 (6) ◽  
pp. 063106 ◽  
Author(s):  
Chia-Hua Wu ◽  
Suiang-Shyan Lee ◽  
Ja-Chen Lin
Keyword(s):  
2013 ◽  
Vol 24 (06) ◽  
pp. 879-897 ◽  
Author(s):  
EN ZHANG ◽  
YONGQUAN CAI

Rational secret sharing was first introduced by Halpern and Teague (STOC, 2004). Since then, a series of works have focused on designing rational secret sharing protocols. However, most existing solutions can share only one secret at one secret sharing process. To share multiple secrets such as m secrets, the dealer must redistribute shares for m times. In addition, previous works assume existence of broadcast channel which is not realistic. Motivated by those problems, this paper proposes a rational multi-secret sharing scheme, which combines the secret sharing scheme with game theory. In the protocol, the problem of sharing multiple secrets is addressed, and there are multiple secrets to be shared during one secret sharing process. Furthermore, this work starts off by constructing a protocol in simultaneous broadcast networks, and then we emulate the broadcast channel over point-to-point networks. Based on a computational assumption, we show that rational players have no incentive to deviate from the protocol and every player can obtain multi-secret fairly.


1996 ◽  
Vol 9 (4) ◽  
pp. 233-250 ◽  
Author(s):  
Wen-Ai Jackson ◽  
Keith M. Martin ◽  
Christine M. O'Keefe

2013 ◽  
Vol 411-414 ◽  
pp. 141-144
Author(s):  
Jun Zhou ◽  
Zhen Yu Yang

The Internet of things is widespread concerned by the whole society now. As an important component of the Internet of things, wireless sensor network has wide application prospect in various fields such as medical and health, military defense. The traditional data privacy protection technology of PKI system used in the WSN networks has its own weakness. This paper presents the secret key sharing mechanism to protect data privacy. The secret key, remote node and base station used to communicate, was divided into multiple secrets. The multiple secrets were distributed in the nodes which connect directly to the base station node. Only through collect more than threshold number of multi-secret that can decrypt the communication data between the base station and the remote node. To be safer, we used digital watermarking technology to protect the data transmission between the base station and the aggregate node. These techniques combined with the data slice, homomorphism encryption technology to protect data privacy, construct a safe and efficient wireless sensor networks.


2008 ◽  
Vol 41 (12) ◽  
pp. 3572-3581 ◽  
Author(s):  
Jen-Bang Feng ◽  
Hsien-Chu Wu ◽  
Chwei-Shyong Tsai ◽  
Ya-Fen Chang ◽  
Yen-Ping Chu

2012 ◽  
Vol 182-183 ◽  
pp. 1992-1997
Author(s):  
Kai Hui Lee ◽  
Pei Ling Chiu

The visual secret sharing for multiple secrets (VSSM) technique allows for the encryption of more than one secret images in a given image area. Previous research on VSSM schemes has a pixel expansion problem that limits the capability to increase the capacity of secret image encryption. Moreover, the VSSM schemes focus on sharing binary images to date. These drawbacks limit the applicability of existing VSSM schemes. In this study, we propose a novel encryption algorithm to address these problems. The proposed algorithm adopts a visual cryptography (VC)–based encryption method that can eliminate the pixel expansion problem and is applicable to halftone secret images. The experimental results demonstrate that the proposed approach not only can increase the capacity of VSSM schemes, but also can maintain an excellent level of display quality in the recovered secret images.


Sign in / Sign up

Export Citation Format

Share Document