57,300 Hits in 6.2 sec

On the Security of Encrypted Secret Sharing

Johannes Braun, Alexander Wiesmaier, Johannes Buchmann
2013 2013 46th Hawaii International Conference on System Sciences  
, the security level decreases with each compromised algorithm at most by the corresponding key length. (5) The scheme increases the effective key lengths of repeatedly applied encryption algorithms.  ...  The scheme has the following properties: (1) It is a (k, n)-threshold scheme, i.e. only k ≤ n of the n applied algorithms are needed for decryption. (2) The scheme's effective bit security is the sum of  ...  If secret sharing is used to achieve long term security, one faces the problem of securely transferring the shares to the share holders.  ... 
doi:10.1109/hicss.2013.426 dblp:conf/hicss/0001WB13 fatcat:daqngz2p25cb3ptzraillzmica

Secret Sharing in the Encrypted Domain with Secure Comparison

Bin Zhao, E. J. Delp
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
A new secure comparison protocol based on the additive homomorphic property and a new scheme of secret sharing in the encrypted domain with secure comparison are proposed.  ...  In light of a few disadvantages of the traditional secret sharing, it is desirable to reconstruct the secret directly from the encrypted shares to protect the secret and shares during secret reconstruction  ...  Both security of the secret and the shares and reusability of the existing encrypted ones can be achieved at the same time.  ... 
doi:10.1109/glocom.2011.6134547 dblp:conf/globecom/ZhaoD11 fatcat:7rcglcranfegfa7bkr4i4qhcde

Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme

Hinal M. Mudia, Pallavi V. Chavan
2016 Procedia Computer Science  
In this fast world of networking, secure image transmission of data whether the image having some information or some text, is one of the area focus for security.  ...  Using fuzzy logic makes encryption and decryption complex. The (2, 2) secret sharing scheme provides secured and confidential authentication.  ...  Encryption can provide a fine solution for security. Secret Sharing: Secret sharing is nothing but dividing of shares in such a way that revealing of a share is of no use.  ... 
doi:10.1016/j.procs.2016.02.110 fatcat:yljq76mjqrglnktbjqognj5sme

A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images

2016 International Journal of Science and Research (IJSR)  
For decryption all the shares are need to be superimposed in proper sequence using these two algorithms. Sender encrypts the message using the secret key and then sends it to the receiver.  ...  For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the Low complexity and bit shifting algorithm which is designed by the user.  ...  the security risks on the secret image.  ... 
doi:10.21275/v5i1.nov152524 fatcat:2orr2nt5dbgntez5ig6dt2nhfe

New Algorithm for user Friendly Encryption

Shyni T S, Anusree L
2015 International Journal of Engineering Research and  
Then meaningful images are embedded on each share using embedding algorithm. At the receiver side after de embedding these meaningful encrypted images are decoded to form the secret image back.  ...  This paper proposes a new algorithm for encrypting secret data to be communicated over internet. This method combines the advantage of normal encryption and visual cryptography.  ...  Embedding images on each encrypted images will improve the security of this system.  ... 
doi:10.17577/ijertv4is051342 fatcat:oqk5psdjy5aovan7auj2il3xwa

A novel video encryption technique based on secret sharing

C. Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar
2008 2008 15th IEEE International Conference on Image Processing  
In this paper, we propose a secure and computationally feasible video encryption algorithm based on the principle of Secret Sharing.  ...  The strength of the DC is distributed among the AC values based on Shamir's Secret Sharing (SSS) scheme.  ...  itself, based on the principle of secret sharing.  ... 
doi:10.1109/icip.2008.4712460 dblp:conf/icip/RajuUSJ08 fatcat:enw4e2w7hrfppkjymigdeen5tq

Discrete Cosine Transformer Based Visual Secret Sharing With Chaos Visual Cryptography

I. Edwin Dayanand, R. K. Selva Kumar
2015 International Journal of Multimedia and Ubiquitous Engineering  
With the increasing threats on multimedia information sharing, degradation of security is one of the most important concerns.  ...  The main objective of DCTCC is to enhance the security level of different level video frame using the encryption key properties.  ...  Experiment is conducted on factors such as efficiency of visual secret sharing of video frame on images, mean square error rate, and secret video sharing efficacy level, encryption time.  ... 
doi:10.14257/ijmue.2015.10.10.11 fatcat:yjnia5tfona4flryb7hn5h5fvu

Secure Data Outsourcing on Cloud Using Secret Sharing Scheme

Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder
2017 International Journal of Network Security  
The encrypted data files will be shared on the cloud. A threshold (t, n)-secret sharing scheme applied on the symmetric key of the encryption algorithm.  ...  Traditionally, the data are kept encrypted to have secure authorized-only access. But, encrypting and decrypting large data files are computationally costly.  ...  The objective of the scheme described in this paper, is to secure the outsourced data with the combined effect of encryption and secret sharing.  ... 
dblp:journals/ijnsec/ChattopadhyayNM17 fatcat:i57i7o3wczatxnomu2k64odonu

A Survey of Visual Cryptographic Method for Secure Data Transmission

Dr. Devakumari D., Geetha K
2017 IJARCCE  
Image steganography, Symmetric encryption and visual cryptography algorithms are applied to enhance overall security of image transaction from one system to another. 274 upgrading technology for sharing  ...  of shares can recover the secret image, second any forbidden or mismatch set of shares cannot obtain any information of the secret image other than the size of the secret image.  ...  To deal with the security problems of secret images, various image secret sharing schemes have been developed III.  ... 
doi:10.17148/ijarcce.2017.6647 fatcat:7raarnav2zashdjrb6wcdnwady

Sharing of a Digital Secret Image by Diverse Media for More Security

Tejbir Kaur, Ajay Kakkar
2017 International Journal of Computer Applications  
The proposed (n, n) -NVSS scheme shares one digital secret image over n-1 arbitrary selected natural images and one noise-like share.  ...  The visual cryptography is an efficient method to share our data in secured manner.  ...  One is the encrypted digital share, encrypted natural share and the secret encrypted share. By applying adding algorithm all the three images are added together to form one share as shown in fig 3.  ... 
doi:10.5120/ijca2017915001 fatcat:5jauqeja7zdslf757vlyatuirm

Encrypted Secret Sharing and Analysis by Plaintext Randomization [chapter]

Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2015 Lecture Notes in Computer Science  
The encryption of different shares can use one key or multiple keys, with natural applications in both scenarios.  ...  In this paper we consider the problem of secret sharing where shares are encrypted using a public-key encryption (PKE) scheme and ciphertexts are publicly available.  ...  strong security result for the general "secret-sharing with encrypted shares" problem.  ... 
doi:10.1007/978-3-319-27659-5_4 fatcat:lspm5wleyrabbisuv4phhi7hva

Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography

Anjali Varshney, Dinesh Goyal
2014 International Journal of Computer Applications  
In this paper we propose an encryption algorithm, which is applied on the different shares of the images.  ...  Before embedding the image into the cover image, shares are also encrypted for which the size of share images and the recovered image is the same as for the original secret image.  ...  Visual cryptography scheme promotes some level of security. The proposed scheme increases the security of secret message by providing the encrypted shares.  ... 
doi:10.5120/17876-8858 fatcat:wwz4aed2t5g2palzh7udt3sg7i

Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems

Tianqi Zhou, Jian Shen, Yongjun Ren, Sai Ji
2021 Security and Communication Networks  
In this paper, we focus on exploring the primitives in cryptography to guarantee the security of blockchain-based ITS.  ...  It should be noted that the proposed threshold key management scheme is efficient and secure for multiple users in blockchain-based ITS, especially for the data-sharing scenario.  ...  Taking advantage of the secret-sharing schemes, the security and fault tolerance data sharing in ITS can be supported. e comparison of CRT and Shamir's secret sharing-based key management scheme is also  ... 
doi:10.1155/2021/1864514 doaj:2ef68e48074b4b8e9803b132406cf7ed fatcat:y7dcbwergrhwbox2rwemgihzsa

A Novel Approach for Enciphering Data of Smaller Bytes

R.Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran
2010 Journal of clean energy technologies  
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypted.  ...  Considering small size of data the requirements change from the existing security encryption techniques. One of the major issues to be considered is the computational speed of the encryption model.  ...  But in our encrypting/decrypting technique, the 4-bit secret key keeps on varying for each character of the plain text, thus increasing the level of security.  ... 
doi:10.7763/ijcte.2010.v2.218 fatcat:viad2wi7c5fltaehdklfriz3lm

A Novel Visual Cryptography Scheme

Debasish Jena, Sanjay Kumar Jena
2009 2009 International Conference on Advanced Computer Control  
A Visual Cryptography is one of the secure techniques that can be used to encrypt a secret document or image by breaking down to shares.  ...  This paper presents an approach to encrypt a generated image share of Visual Cryptography using Public key Encryption. We used RSA algorithm in order to provide the double security of the document.  ...  This proposed method improves the issue of security shares of Visual Cryptography by encrypting with Public Key Cryptography [10] , which provides much security for the transfer of secret information  ... 
doi:10.1109/icacc.2009.109 fatcat:enjmt3wz5bbxnae3uvzt32ypca
« Previous Showing results 1 — 15 out of 57,300 results