The Library
Efficient (k, n) : threshold secret sharing method with cheater prevention for QR code application
Tools
Huang, Peng-Cheng, Chang, Ching-Chun and Li, Yung-Hui (2022) Efficient (k, n) : threshold secret sharing method with cheater prevention for QR code application. Journal of Internet Technology, 23 (1). pp. 157-165. doi:10.53106/160792642022012301016 ISSN 1607-9264.
|
PDF
WRAP-Efficient-k-n-threshold-secret-sharing-method-with-cheater-prevention-for-QR-code-application-Chang-2022.pdf - Published Version - Requires a PDF viewer. Download (700Kb) | Preview |
Official URL: http://dx.doi.org/10.53106/160792642022012301016
Abstract
To protect secret message, secret sharing technique divides it into n shares and distributes them to n involved participants. However, it is hardly to prevent a dishonest participant to cheat other by providing a fake share. To overcome this weakness, this paper presents an efficient (k, n)-threshold secret sharing approach with the functionality of cheater identification using meaningful QR codes. The secret message would be split into k pieces, and used as the coefficients of polynomial function to generate n shares. These shares would be concealed into cover QR codes based on its fault tolerance to generate meaningful QR code shares. The meaningful QR code shares are helpful to reduce the curiosity of unrelated persons when transmitted in public channel. The legitimacy of QR code share would be verified before secret reconstruction to prevent cheater in secret revealing procedure. Some experiments were done to evaluate the performance of the proposed scheme. The experimental results show that the proposed scheme is efficient, highly secure and highly robust, and it also achieves a higher embedding capacity compared to previous methods.
Item Type: | Journal Article | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | |||||||||||||||||||||||||||
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | |||||||||||||||||||||||||||
Library of Congress Subject Headings (LCSH): | QR codes , Computer security , Data encryption (Computer science) | |||||||||||||||||||||||||||
Journal or Publication Title: | Journal of Internet Technology | |||||||||||||||||||||||||||
Publisher: | Taiwan Academic Network | |||||||||||||||||||||||||||
ISSN: | 1607-9264 | |||||||||||||||||||||||||||
Official Date: | January 2022 | |||||||||||||||||||||||||||
Dates: |
|
|||||||||||||||||||||||||||
Volume: | 23 | |||||||||||||||||||||||||||
Number: | 1 | |||||||||||||||||||||||||||
Page Range: | pp. 157-165 | |||||||||||||||||||||||||||
DOI: | 10.53106/160792642022012301016 | |||||||||||||||||||||||||||
Status: | Peer Reviewed | |||||||||||||||||||||||||||
Publication Status: | Published | |||||||||||||||||||||||||||
Access rights to Published version: | Open Access (Creative Commons) | |||||||||||||||||||||||||||
Date of first compliant deposit: | 27 April 2022 | |||||||||||||||||||||||||||
Date of first compliant Open Access: | 28 April 2022 | |||||||||||||||||||||||||||
RIOXX Funder/Project Grant: |
|
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year