adversary structure
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 0)

H-INDEX

6
(FIVE YEARS 0)

2020 ◽  
Vol 508 ◽  
pp. 329-342 ◽  
Author(s):  
Chunming Tang ◽  
Qiuxia Xu ◽  
Gengran Hu

2016 ◽  
Vol 76 (20) ◽  
pp. 21193-21210 ◽  
Author(s):  
Cheng Guo ◽  
Qiongqiong Yuan ◽  
Kun Lu ◽  
Mingchu Li ◽  
Zhangjie Fu

2016 ◽  
Vol 2016 ◽  
pp. 1-11
Author(s):  
Lifeng Yuan ◽  
Mingchu Li ◽  
Cheng Guo ◽  
Weitong Hu ◽  
Xinjian Luo

In secret image sharing schemes, the threshold may have to be adjusted in case of changes in the security policy and the adversary structure before recovering the secret image. For example, if participants leave the group, their stego images are useless to them and may not be kept safely. As a result, these images can be easily stolen and utilized by intruders, which reduces the security of the scheme. To solve this problem, we propose a novel threshold changeable secret image sharing scheme withNpotential changeable thresholdst1,t2,…,tN. By preparing advance shares for thresholdst1,t2,…,tNand using the two-variable one-way function to generate the identification value, we can change the threshold when necessary. The experiments show that the quality of the stego images in our scheme is satisfactory and the secret image can be recovered without distortion. Moreover, the security analysis shows that we can change the threshold safely.


2014 ◽  
Vol 665 ◽  
pp. 647-653
Author(s):  
Hua Wang Qin ◽  
Xiao Hua Zhu ◽  
Yue Wei Dai

A leakproof secret sharing scheme based on environment sensing is proposed, in which the shadows of participants and the shared secret are leakproof, and can be used repeatedly. The counterfeit shadows of the participants and the authentication information of the shared secret can be changed dynamically basing on environment sensing. So the scheme is secure even against a mobile adversary. Besides, through introducing the concept of adversary structure and the transformation of access structure to adversary structure, the secret sharing on general access structure is realized. Compared to the existing schemes, our scheme is more secure and more flexible in practice. Our scheme is particularly suitable for the system which needs to run long time in the open, such as the wireless sensor network and the multi-robots, the property of leakproof based on environment sensing can improve the efficiency and security of these systems effectively.


2012 ◽  
Vol 112 (17-18) ◽  
pp. 683-687 ◽  
Author(s):  
Hong Lai ◽  
Jinghua Xiao ◽  
Lixiang Li ◽  
Yixian Yang

Sign in / Sign up

Export Citation Format

Share Document