2020
DOI: 10.1007/s11042-020-09723-7
|View full text |Cite
|
Sign up to set email alerts
|

Utilization of secret sharing technology for secure communication: a state-of-the-art review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 87 publications
0
9
0
Order By: Relevance
“…Different from text data outsourcing, applications with massive amounts of images have faced memory space issues with Shamir's scecret sharing scheme due to the N times of share size (of the images) required. For efficiency consideration, another secret sharing scheme, called ramp secret sharing (or multi-secret sharing) has therefore been utilized to replace Shamir's secret sharing scheme for outsourcing image datasets [20], [21]. More precisely, as compared with Shamir's (k, N )threshold secret sharing scheme, an ( , k, N ) ramp secret sharing scheme reduces the share size by 1 times at the sacrifice of security level though (which can be improved by incorporating an additional security solution such as permutation, stenography, matrix projection, etc..) [21].…”
Section: Introduction a Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Different from text data outsourcing, applications with massive amounts of images have faced memory space issues with Shamir's scecret sharing scheme due to the N times of share size (of the images) required. For efficiency consideration, another secret sharing scheme, called ramp secret sharing (or multi-secret sharing) has therefore been utilized to replace Shamir's secret sharing scheme for outsourcing image datasets [20], [21]. More precisely, as compared with Shamir's (k, N )threshold secret sharing scheme, an ( , k, N ) ramp secret sharing scheme reduces the share size by 1 times at the sacrifice of security level though (which can be improved by incorporating an additional security solution such as permutation, stenography, matrix projection, etc..) [21].…”
Section: Introduction a Problem Statementmentioning
confidence: 99%
“…For efficiency consideration, another secret sharing scheme, called ramp secret sharing (or multi-secret sharing) has therefore been utilized to replace Shamir's secret sharing scheme for outsourcing image datasets [20], [21]. More precisely, as compared with Shamir's (k, N )threshold secret sharing scheme, an ( , k, N ) ramp secret sharing scheme reduces the share size by 1 times at the sacrifice of security level though (which can be improved by incorporating an additional security solution such as permutation, stenography, matrix projection, etc..) [21]. In this work we concentrate on text data outsourcing which can be efficiently protected by Shamir's secre sharing scheme without the need of any additional security mechanism.…”
Section: Introduction a Problem Statementmentioning
confidence: 99%
“…In recent years, the use of traffic camouflage, channel invisibility, and other means of covert communication has become a hot spot of network countermeasures. Network covert communication refers to the violation of communication restriction rules in the network environment [1,2], which makes some network resources in the network protocol that are not used for communication have the ability to transfer information [3], so as to avoid review and supervision. The existing network covert communication is based on the prisoner's dilemma model in narrow sense, and the related research can be divided into three aspects, namely, symbol design [4,5], channel coding [6][7][8], and channel optimization [9].…”
Section: Introductionmentioning
confidence: 99%
“…(1) At the model level, the traditional covert communication only focuses on the machine detection rules, without the cognitive modeling of human sensory abnormalities, which is difficult to resist the cognitive review of "human in the system." This is a blank in the model of covert communication (2) At the algorithm level, the information carrying of traditional covert communication is the explicit intervention and modulation of symbols, so it is necessary to write a fixed covert algorithm, which leads to poor diversity of covert channel and weak antianalysis ability…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation