Abstract
Polynomial-based secret sharing is the art of protecting information and a tool used in areas where a secret has to be distributed among multiple parties. In this method, the secret is encrypted into noisy shares and transferred to participants in the group. Decoding of the secret is possible only when a sufficient number of authorized members in the group, stack their respective shares. In this article, polynomial-based secret sharing for audio is proposed that generates audio shares of smaller dimensions so that it has the benefit of saving storage space and reducing transmission overhead. In addition, an authentication mechanism is proposed to check the validity of shares before the reconstruction of the secret. Experimental results indicate that proposed scheme can efficiently generate noisy shares with reduced dimensions and can reconstruct secret without loss of information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lake, B., Mihailo, I., Michel, A.K.: A secure and robust scheme for sharing confidential information in IoT systems. Ad Hoc Netw. 92, 101762 (2019)
Harkeerat, K., Pritee, K.: Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Futur. Gener. Comput. Syst. 102, 30–41 (2020)
Jian, S., Dengzhi, L., Xingming, S., Fushan, W., Yang, X.: Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities. Futur. Gener. Comput. Syst. 109, 450–456 (2020)
En, Z., Ming, L., Siu-Ming, Y., Jiao, D., Jun-Zhe, Z., Gang-Gang, J.: Fair hierarchical secret sharing scheme based on smart contract. Inf. Sci. 546, 166–176 (2021)
Lakshmi, V.S., Deepthi, S., Deepthi, P.P.: Collusion resistant secret sharing scheme for secure data storage and processing over cloud. J. Inform. Security Appl. 60, 102869 (2021)
Jeonghun, C., Sushil, K.S., Tae, W.K., Jong, H.P.: Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inform. Security Appl. 57, 102686 (2021)
Na, W., Junsong, F., Jiwen, Z., Bharat, K.B.: Source-location privacy full protection in wireless sensor networks. Inf. Sci. 444, 105–121 (2018)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In Proceedings of the AFIPS National Computer Conference 48, 313–317 (1979)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graphics 26(5), 765–770 (2002)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405–414 (2004)
Wang, R., Shyu, S.: Scalable secret image sharing. Signal Process.: Image Commun. 22(4), 363–373 (2007)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Ma, Z., Ma, Y., Huang, X., Zhang, M., Liu, Y.: Applying cheating identifiable secret sharing scheme in multimedia security. EURASIP J. Image Video Process. 2020(1), 1–42 (2020). https://doi.org/10.1186/s13640-020-00529-z
Shyamalendu, K., Bibhas, C.D.: A verifiable secret sharing scheme with combiner verification and cheater identification. J. Inform. Secur. Appl. 51, 102430 (2020)
Phiri, K.K., Ali, P., Eneya, L., Kim, H.: Linear (t, n) secret sharing scheme based on single polynomial. Int. J. Appl. Eng. Res. 13, 11600–11605 (2018)
Desmedt, Y., Hou, S., Quisquater, J.J.: Audio and optical cryptography. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 392–404. Springer, Berlin, Heidelberg (1998). https://doi.org/10.1007/3-540-49649-1_31
Huan, L., Zheng, Q., Xuanping, Z., Xu, W.: Auditory cryptography security algorithm with audio shelters. Adv. Control Eng. Inform. Sci.-Procedia Eng. 15, 2695–2699 (2011)
Guttikonda, P., Mundukur, N.B.: Secret sharing with reduced share size and data integrity. Ingénierie des Systèmes d’Information 25(2), 227–237 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guttikonda, P., Mundukur, N.B. (2023). Polynomial-Based Secret Audio Sharing Scheme with Smaller Share Dimensions and Authentication. In: Abraham, A., Hanne, T., Gandhi, N., Manghirmalani Mishra, P., Bajaj, A., Siarry, P. (eds) Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022). SoCPaR 2022. Lecture Notes in Networks and Systems, vol 648. Springer, Cham. https://doi.org/10.1007/978-3-031-27524-1_51
Download citation
DOI: https://doi.org/10.1007/978-3-031-27524-1_51
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-27523-4
Online ISBN: 978-3-031-27524-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)