2005
DOI: 10.1016/j.amc.2005.01.026
|View full text |Cite
|
Sign up to set email alerts
|

A secret sharing scheme based on cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Generally, in recovering phase, any − 1 or fewer shadows cannot provide sufficient information to restore the original secret image. For the proof of this feature, please refer to Section 3.2 in the scheme of [31].…”
Section: Analysis Of the Embeddable Capacity Embedding Ways And Othmentioning
confidence: 99%
“…Generally, in recovering phase, any − 1 or fewer shadows cannot provide sufficient information to restore the original secret image. For the proof of this feature, please refer to Section 3.2 in the scheme of [31].…”
Section: Analysis Of the Embeddable Capacity Embedding Ways And Othmentioning
confidence: 99%
“…Using linear memory cellular automata, a secret sharing scheme has been proposed initially by [5]. As the scheme is a (t,n)-threshold one, the secret is considered as an initial configuration of a t-order LMCA, while remaining (t-1) configurations are randomly generated.…”
Section: Secret Sharing Using Lmcasmentioning
confidence: 99%
“…The set {C 0 ,C 1 ,.....,C t-1 } is then used to build an (n+t-1)-th order evolution of the LMCA to obtain a set of n consecutive configuration {C t ,C t+1 ,.....,C n+t-1 } distributed among the n participants. When required, any set of t consecutive configurations {C t+ ,C t++1 ,.....,C 2t+-1 } is used to define a set {̃( 0) ,̃( 1) , … ,̃( −1) } as the initial configuration to run the inverse LMCA backward for +t iterations and recover the secret [5]. The set of t-1 transition rules used for the LMCA evolution 1, 2,....., t-1 is generated initially by the dealer and made public without affecting the security of the scheme.…”
Section: Secret Sharing Using Lmcasmentioning
confidence: 99%
See 1 more Smart Citation
“…In [10], a particular type of discrete dynamical system called one-dimensional memory cellular automata, denoted for short by CA, is used to design a (t, n)-threshold scheme in which at least t consecutive shares are needed to reconstruct the secret. In [6], these structures are employed in the context of secret image sharing with steganographic properties.…”
Section: Introductionmentioning
confidence: 99%