A self-authentication mechanism for a (3, 3)-threshold secret sharing scheme

Yi Hui Chen*, Ci Wei Lan

*Corresponding author for this work

Research output: Contribution to conferenceConference Paperpeer-review

Abstract

Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images. The authentication mechanism is a way to verify whether the reconstructed secret image is authentic. The general authentication might increase the cost of key maintenance. To reduce the cost, this paper proposed a self-authentication mechanism for image secret sharing scheme. In addition, the reconstructed image can be completely reconstructed. The experiments give the positive data to show the feasibility of the proposed scheme.

Original languageEnglish
Pages1006-1008
Number of pages3
DOIs
StatePublished - 2012
Externally publishedYes
Event9th IEEE International Conference on Ubiquitous Intelligence and Computing, UIC 2012 and 9th IEEE International Conference on Autonomic and Trusted Computing, ATC 2012 - Fukuoka, Japan
Duration: 04 09 201207 09 2012

Conference

Conference9th IEEE International Conference on Ubiquitous Intelligence and Computing, UIC 2012 and 9th IEEE International Conference on Autonomic and Trusted Computing, ATC 2012
Country/TerritoryJapan
CityFukuoka
Period04/09/1207/09/12

Keywords

  • Authentication mechanism
  • Lossless reconstruction
  • Secret sharing

Fingerprint

Dive into the research topics of 'A self-authentication mechanism for a (3, 3)-threshold secret sharing scheme'. Together they form a unique fingerprint.

Cite this