×

A verifiable multi-secret sharing scheme based on cellular automata. (English) Zbl 1193.94070

Summary: We propose a verifiable \((t, n)\)-threshold multi-secret sharing scheme, based on one-dimensional cellular automata where the number of secrets is not restricted by \(n\) or \(t\). We show that our scheme can be used to solve an open problem proposed recently by G. Alvarez, L. Hernández Encinas and A. Martín del Rey [Inf. Sci. 178, No. 22, 4382–4395 (2008; Zbl 1231.94058)].

MSC:

94A62 Authentication, digital signatures and secret sharing
68Q80 Cellular automata (computational aspects)

Citations:

Zbl 1231.94058
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Alonso-Sanz, R., Reversible cellular automata with memory: two-dimensional patterns from a single seed, Physica D, 175, 1-30 (2003) · Zbl 1008.37008
[2] Alvarez, G.; Hernández Encinas, L.; Martín del Rey, A., A multisecret sharing scheme for color images based on cellular automata, Information Sciences, 178, 4382-4395 (2008) · Zbl 1231.94058
[3] Blakley, G. R., Safeguarding cryptographic keys, AFIPS Conference Proceedings, 48, 313-317 (1979)
[4] Chang, C. C.; Lin, C.; Lin, C. H.; Chen, Y. H., A novel secret image sharing scheme in color images using small shadow images, Information Sciences, 178, 2433-2447 (2008)
[6] Eslami, Z.; Razzaghi, S. H.; Zarepour Ahmadabadi, J., Secret image sharing based on cellular automata and steganography, Pattern Recognition, 43, 397-404 (2010) · Zbl 1186.94477
[7] Hadian Dehkordi, M.; Mashhadi, S., New efficient and practical verifiable multi-secret sharing schemes, Information Sciences, 178, 2262-2274 (2008) · Zbl 1137.94009
[8] He, J.; Dawson, E., Multistage secret sharing based on one-way function, Electronics Letters, 30, 19, 1591-1592 (1994)
[9] Hwang, R. J.; Chang, C. C., An on-line secret sharing scheme for multi-secrets, Computer Communications, 21, 1170-1176 (1998)
[10] Martin del Rey, A.; Pereira Mateus, J.; Rodriguez Sanchez, G., A secret sharing scheme based on cellular automata, Applied Mathematics and Computation, 170, 1356-1364 (2005) · Zbl 1083.94536
[11] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of Applied Cryptography (1997), CRC Press: CRC Press Boca Raton, FL · Zbl 0868.94001
[12] Shamir, A., How to share a secret?, Communications of the ACM, 22, 612-613 (1979) · Zbl 0414.94021
[13] Shao, J.; Cao, Z. F., A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme, Applied Mathematics and Computation, 168, 135-140 (2005) · Zbl 1076.94011
[14] Toffoli, T.; Margolus, N., Invertible cellular automata: a review, Physica D, 45, 229-253 (1990) · Zbl 0729.68066
[15] Tsai, D. S.; Horng, G.; Chen, T. H.; Huang, Y. T., A novel secret image sharing scheme for true-color images with size constraint, Information Sciences, 179, 3247-3254 (2009)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.