DocumentCode :
3641608
Title :
Secret sharing scheme based on mignotte´s scheme
Author :
Güzin Ulutaş;Mustafa Ulutaş;Vasif Nabiyev
Author_Institution :
Bilgisayar Mü
fYear :
2011
fDate :
4/1/2011 12:00:00 AM
Firstpage :
291
Lastpage :
294
Abstract :
Shamir proposed a secret sharing method called by (k, n) threshold scheme that divides secret image among n participants in 1979. In 1983, Mignotte proposed a new threshold scheme that is based on Chinese Remainder Theorem. In recent years, secret sharing schemes become popular during the transmission of secret image over the Internet. While many works in the literature are using Shamir´s scheme for secret image sharing, Shyu et al. suggested using Mignotte´s scheme for sharing purposes. However their method uses random function that´s seed value must be known before the sharing procedure to cope with the cases like share images contain information about the secret image. Their method necessitates sharing the seed value before the transmission of share images. Proposed method ensures (k, n) property of Mignotte´s scheme while it does not require any transmission before the sharing procedure. Therefore, secrecy of the sharing algorithm is enhanced with respect to Shyu et al.´s method. Method improves system´s security due not to need distribution of any data before the transmission of share images.
Keywords :
"Conferences","Cryptography","Signal processing","Authentication","Internet","Software","Computers"
Publisher :
ieee
Conference_Titel :
Signal Processing and Communications Applications (SIU), 2011 IEEE 19th Conference on
ISSN :
2165-0608
Print_ISBN :
978-1-4577-0462-8
Type :
conf
DOI :
10.1109/SIU.2011.5929644
Filename :
5929644
Link To Document :
بازگشت