Keywords

45.1 Introduction

One of the fastest developing subjects associated with application of modern and advanced information technologies to manage information in commercial organizations, comprises the acquisition, flow and intelligent analysis of the information management process. During several recent years there were developed many different cryptographic procedures for secure information splitting or sharing, which may be applied for secure information distribution in particular organization. Among such algorithms it is possible to find some special examples of splitting procedures, which are based on using personal data in the sharing algorithm. From strategic point of view it may be very interesting, when as input values we can also put biometric or personal information for generation of particular shares. In the next section we’ll try to describe some important features of crypto-biometric techniques, which may be used for secret sharing tasks [8, 9].

45.2 Security of Threshold Schemes

Secure information management procedures may be oriented towards developing cryptographic threshold schemes for sharing and secure distribution of information. The ideas of such schemes are hide information and guarantee its confidentiality, but in our research we also made attempts to use such techniques to create new models for intelligent management of strategic information [10, 11]. Especially challenging problem is to perform hierarchical secret splitting and shares management. What characterizes such a split is the possibility of reconstructing information from sets containing various numbers of shares of split secret. For this purpose we proposed a special threshold schemes called linguistic threshold schemes [9] dedicated for information sharing and using them to manage secret data in various hierarchical organisational structures [7].

Such algorithms allow effectively use threshold techniques of information sharing for multilevel management of data in digital form. The proposed general model for sharing information was additionally based on mathematical linguistic formalisms including protocols for information retrieval, and the range of application of such techniques is very broad for various organizational structures.

Linguistic threshold schemes allow to move from purely mathematical models of information sharing, or from using them only in dedicated, specialized information sharing problems, to a broader application of such techniques to manage secret data, designed for broader user groups. Such information can be stored by any commercial organization or state institution, and its meaning can be used only if it is accessed as authorized by appointed, entitled groups of users or employees. This is why we will attempt to define a model structure of the flow and assignment of information shares to individual groups of stakeholders. The proposed model could then be rolled out for its practical use in any commercial organization or state institution based on its legacy information system [1].

The new method of information splitting is called linguistic threshold schemes [8]. Mathematical linguistic techniques have not yet been used in information splitting, so building a new protocol for splitting secret data using these techniques represents a new research element in this field.

45.3 Crypto-Biometric Sharing Schemes

A great number of cryptographic threshold procedures were developed. Some of them may also use individual human information or biometric patterns [24]. Nowadays, information frequently needs to be kept back from unauthorized persons, so it is not always enough to just encrypt it with various types of algorithms.

For better supporting the authentication and authorization process, we can also verify biometric features, like fingerprints, voice characteristics or the retina. DNA molecules are also playing an increasing role in cryptography, but it was only in the 21st century that science offered opportunities of using them as information media, and the replication processes taking place in them as information coding techniques. Recent years have seen increasingly frequent reports of further discoveries, while the results of DNA research are becoming significant not just in biology or genetics, but also in the field of cryptography and steganography [11].

People have not realises the computational potential associated with molecules for many years. The first ideas of combining computers with DNA chains appeared in 1973, when Charles Bennett published a paper in which he proposed a model of a programmable molecular computer capable of executing any algorithm [11]. Since then, many new proposals for using DNA sequences as an information medium, have been made. Practically every such method of classifying data boils down, at least at one stage, to storing this data in the appropriate DNA molecules. At this level there are several available possibilities of using these acids as the medium for coded information.

The most obvious one is using the structure of particular nucleotides. As four types of them can be distinguished, one base can store 2 bits of information. We can thus assume that the coding will, for example, be executed as presented in Fig. 45.1. One can also start from the assumption that one pair of nucleotides (a single hydrogen bond irrespective of its polarisation) corresponds to one bit of information (Fig. 45.1).

Fig. 45.1
figure 1

Possible methods of coding information using DNA molecules

Such information coding methods are used in biological solutions which have inspired us to development of a new class of algorithms for secret splitting [11]. However, linguistic threshold scheme operates in a more general way and supports coding secret information (to be split) in longer sequences, i.e. containing more than 2 bits of information [9]. The purpose of this algorithm is a threshold split of strategic data managed within hierarchical structures, with varied access capabilities dependent on the rights granted [11].

45.4 Security Features for Strategic Information Management

In presentation of strategic data splitting and sharing algorithms it has become necessary to describe security features of linguistic algorithms used for information splitting and data reconstruction. The essence of this approach, representing an interdisciplinary topic straddling the border between the subjects of commercial organisation management and of information theory, is an attempt to use cryptographic methods more commonly applied in engineering and technical fields for purposes for which such solutions have not yet been proposed like economy and management sciences.

The proposed algorithmic solutions for data splitting and sharing have the following important properties and characteristic security features:

  • Linguistic cryptographic threshold algorithms are suitable for dividing important strategic data and assigning shares to members from the authorized group;

  • The algorithms are based on digital data (texts, images, voice recordings) which needs to be intelligently split among authorized persons, and then its secret reconstruction must be possible;

  • There are wide opportunities to combine traditional methods of cryptographic information splitting ((m, n)-threshold schemes) with the presented protocols;

  • The ability to present information in the form of its bit recording or sequences of blocks containing n bits;

  • Introducing additional safeguards against the unauthorized reconstruction of the information and the possibility of implementing two independent versions of protocols for assigning the created shadows to individual protocol participants: the option with a trusted arbitrator intermediating in assigning and reconstructing the information and the option without an arbitrator (an additional trusted party), but only with assigning the introduced grammar as an additional part of the secret;

  • The ability to introduce restrictions of the length of coded bit blocks in the proposed scheme, as a result of which the defined grammar will not contain a large number of derivation rules;

  • The computational complexity of the proposed schemes is polynomial.

The above characteristics of the linguistic algorithms of information division constitute their advantages and show how universal these proposed methods for splitting and sharing secret or strategic information in commercial organisation are.

45.5 Conclusions

In this chapter were described some advances in using biometric information to develop new procedures for secret information sharing called linguistic thresholds schemes. Processes of splitting strategic data are currently used in many fields of life, science and economy. Application of linguistic coding methods in the concealment and analysis processes, offers the full capability of using personal information for such purposes. Concealing biometric or personal data constitutes a very important problem because it is highly probable that personal data will be taken over by unauthorized persons. The individual DNA code and many other standard or non-standard biometrics may be used during sharing procedure [5, 6].