Threshold changeable secret image sharing using bivariate polynomial
In secret image sharing (SIS) scheme, a confidential image is encrypted into multiple shadows, any group of shadows that reaches the threshold, otherwise nothing can be reconstructed at all. Most existing SIS schemes have a fixed threshold, however in this work, we consider more complicated cases that the threshold may be adjusted due to the changeable security environment. In this paper, we construct a $(k\leftrightarrow h,n)$ threshold changeable SIS (TCSIS) scheme using bivariate polynomial, which has $h-k+1$ possible thresholds $k,k+1,...,h$. During image reconstruction, each participant can update the his shadow according to the current threshold $T$ only based on his initial shadow. Comparing with previous TCSIS schemes, the proposed scheme achieves unconditional security, and can overcome the information disclosure problem caused by homomorphism.
Figure 1
Figure 2
Figure 3
Due to technical limitations, full-text HTML conversion of this manuscript could not be completed. However, the manuscript can be downloaded and accessed as a PDF.
This is a list of supplementary files associated with this preprint. Click to download.
Posted 18 May, 2020
Threshold changeable secret image sharing using bivariate polynomial
Posted 18 May, 2020
In secret image sharing (SIS) scheme, a confidential image is encrypted into multiple shadows, any group of shadows that reaches the threshold, otherwise nothing can be reconstructed at all. Most existing SIS schemes have a fixed threshold, however in this work, we consider more complicated cases that the threshold may be adjusted due to the changeable security environment. In this paper, we construct a $(k\leftrightarrow h,n)$ threshold changeable SIS (TCSIS) scheme using bivariate polynomial, which has $h-k+1$ possible thresholds $k,k+1,...,h$. During image reconstruction, each participant can update the his shadow according to the current threshold $T$ only based on his initial shadow. Comparing with previous TCSIS schemes, the proposed scheme achieves unconditional security, and can overcome the information disclosure problem caused by homomorphism.
Figure 1
Figure 2
Figure 3
Due to technical limitations, full-text HTML conversion of this manuscript could not be completed. However, the manuscript can be downloaded and accessed as a PDF.