To read the full version of this content please select one of the options below:

An in-depth analysis of strong t-consistency on secret image sharing

Anneke Soraya Hidayat (School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea)
Gil-Je Lee (School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea)
Eun-Jun Yoon (Department of Cyber Security, Kyungil University, Gyenggsan-Si, South Korea)
Kee-Young Yoo (School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 4 April 2016

Abstract

Purpose

The detection of an adversary in secret image sharing has been a problematic side in the reconstruction phase. Some of verifiable secret sharing solutions have been proposed to solve the problem. However, there is some computational limitation in the previous schemes. The purpose of this paper is to analyze the importance of consistency for detecting an adversary in a secure reconstruction phase. Strong t-consistency assures the correctness of reconstructed secret as long as participants P ∈ N and n(P) = t. Consistency is a solution for preventing the participant to be absent and helps the dealer to easily detect the adversary without an additional verification step.

Design/methodology/approach

This paper focuses on secure reconstruction, and uses two different approaches, namely, single-secret and multi-secret, to experiment the relationship between the given variable (t,m,n) and the adversaries by observing the quality test result, polynomial approach and visualization.

Findings

The results show that t and m are inversely proportional to the image quality without respect to the polynomial approach. The reconstruction phase is declared as securely conducted when m = 2t − 1, for both single- and multi-secret approaches.

Originality/value

The application of consistency is a considerable step for securing the secret from an adversary by combining the reconstruction phase and the consistency combination at once, removing the need for additional separate verification steps for decreasing the computational time, especially in secret image sharing.

Keywords

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Education (NRF-2015R1D1A1A01060801), and by the Institute for Information & Communications Technology Promotion (IITP) grant, funded by the Korean Government (MSIP) [No. 10041145, Self-Organized Software platform (SoSp) for Welfare Devices].

Citation

Hidayat, A.S., Lee, G.-J., Yoon, E.-J. and Yoo, K.-Y. (2016), "An in-depth analysis of strong t-consistency on secret image sharing", International Journal of Pervasive Computing and Communications, Vol. 12 No. 1, pp. 107-126. https://doi.org/10.1108/IJPCC-01-2016-0006

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited