National University of Defense Technology, Hefei 230037, China.
Math Biosci Eng. 2021 Mar 12;18(3):2473-2495. doi: 10.3934/mbe.2021126.
A (k,n) threshold secret image sharing (SIS) scheme divides a secret image into n shadows. One can reconstruct the secret image only when holding k or more than k shadows but cannot know any information on the secret from fewer than k shadows. Based on this characteristic, SIS has been widely used in access control, information hiding, distributed storage and other areas. Verifiable SIS aims to prevent malicious behaviour by attackers through verifying the authenticity of shadows and previous works did not solve this problem well. Our contribution is that we proposed a verifiable SIS scheme which combined CRT-based SIS and (2,n+1) threshold visual secret sharing(VSS). Our scheme is applicable no matter whether there exists a third party dealer. And it is worth mentioning that when the dealer is involved, our scheme can not only detect fake participants, but also locate dishonest participants. In general, loose screening criterion and efficient encoding and decoding rate of CRT-based SIS guarantee high-efficiency shadows generation and low recovery computation complexity. The uncertainty of the bits used for screening prevents malicious behavior by dishonest participants. In addition, our scheme has the advantages of lossless recovery, no pixel expansion and precise detection.
一种 (k,n) 门限秘密图像共享 (SIS) 方案将秘密图像划分为 n 个影子。只有持有 k 个或更多影子时才能重构秘密图像,但从少于 k 个影子中无法获得任何关于秘密的信息。基于这一特性,SIS 已被广泛应用于访问控制、信息隐藏、分布式存储等领域。可验证 SIS 旨在通过验证影子的真实性来防止攻击者的恶意行为,但以前的工作并没有很好地解决这个问题。我们的贡献是提出了一种可验证的 SIS 方案,该方案结合了基于 CRT 的 SIS 和 (2,n+1) 门限视觉秘密共享 (VSS)。我们的方案无论是否存在第三方经销商都适用。值得一提的是,当涉及经销商时,我们的方案不仅可以检测到虚假的参与者,还可以定位不诚实的参与者。总的来说,基于 CRT 的 SIS 的宽松筛选标准和高效的编码和解码率保证了高效的影子生成和低恢复计算复杂度。用于筛选的位的不确定性可以防止不诚实参与者的恶意行为。此外,我们的方案具有无损恢复、无像素扩展和精确检测的优点。