A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
Mohammad Ghebleh,
Ali Kanso and
Abdullah Alazemi
Additional contact information
Mohammad Ghebleh: Department of Mathematics, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait
Ali Kanso: Department of Mathematics, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait
Abdullah Alazemi: Department of Mathematics, Kuwait University, P.O. Box 5969, Safat 13060, Kuwait
Mathematics, 2022, vol. 10, issue 5, 1-16
Abstract:
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the secret. For positive integers r , s , t , n with r ⩽ s ⩽ t ⩽ n , an ( r , s , t , n ) –threshold essential secret sharing scheme is an algorithm that decomposes a secret S into n shares, s of which are essential, in a way that authorized subsets are precisely those with at least t members, at least r of whom are essential. This work proposes a lossless linear algebraic ( r , s , t , n ) –threshold essential secret image sharing scheme that decomposes the secret, S , into equally-sized shares, each of size 1 / t the size of S . For each block, B , of S , the scheme assigns to the n participants distinct signature vectors v 1 , v 2 , … , v n in the vector space F 2 α t , where α is a suitable positive integer, typically between 2 and 5, inclusive. These signature vectors must adhere to some admissibility conditions in order to satisfy the secret sharing threshold properties. The decomposition of B into n shares is obtained by partitioning B into t vectors, then computing the share y j of the j th participant ( 1 ≤ j ≤ n ), as a linear combination of these parts with coefficients from the signature v j . The presented simulations showcase the effectiveness and robustness of the proposed scheme against standard statistical and security attacks. They further demonstrate its superiority with respect to existing schemes.
Keywords: secret sharing; threshold secret sharing; essential secret sharing; secret image sharing; admissible tracks; chaos (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/5/742/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/5/742/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:5:p:742-:d:759402
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().