Utilization of secret sharing technology for secure communication: a state-of-the-art review
- PDF / 1,220,278 Bytes
- 25 Pages / 439.37 x 666.142 pts Page_size
- 52 Downloads / 161 Views
Utilization of secret sharing technology for secure communication: a state-of-the-art review Parsa Sarosh 1 & Shabir A. Parah 1
& G. M. Bhat
2
Received: 2 March 2020 / Revised: 3 August 2020 / Accepted: 25 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Cryptography is the process by which a readable message is converted into ciphertext unintelligible to an eavesdropper. With the advent of the internet, improved network infrastructures, and modern applications, electronic-based systems came into existence. Subsequently, the need for security of the personalized information was discerned. The purpose of the use of cryptography is to provide security, confidentiality, authenticity, and integrity of the data exchanged. Many cryptographic techniques which include the symmetric key and asymmetric key-based encryption techniques are generally employed for the above-mentioned purposes. However, it is seen that in cryptographic solutions key management is an important issue. In this review, we discuss the secret-sharing based cryptographic techniques that are inherently different from the conventional cryptographic systems. Since images constitute a large proportion of the multimedia transmitted, the concept of secret sharing is being applied to images as well. In this review, Image Secret Sharing techniques have been discussed in detail. Secret sharing or secret splitting is a method by which a secret is divided among a set of participants. Each participant receives a part or share of the secret. During the secret recovery phase, a subset of a predefined number of participants can collaborate and reveal the secret information. This work attempts to categorize and classify various available secret sharing schemes, to gather all the state-of-the-art knowledge on a single platform for research. Keywords Multimedia security . Secret sharing . Polynomial secret sharing . Visual secret sharing
* Shabir A. Parah [email protected]
1
Department of Electronics and IT, University of Kashmir, Kashmir 190006, India
2
Department of Electronics Engineering, Institute of Technology, Zakura 190006, India
Multimedia Tools and Applications
1 Introduction The importance of cryptography has been acknowledged and emphasized with the increase of digital data transmission over the internet and other multi-user networks. The issues of data confidentiality, preservation, and availability have emerged as active areas of substantial research. Various types of cryptographic techniques include symmetric and asymmetric keybased techniques. However, there has been an increasing interest in data transmission using secret sharing based methods. Secret sharing was initially developed to address the problem of single-point failures commonly seen in key-based systems and the issue of access control to prevent exploitation of sensitive information by authorized personnel. Since then, several application areas for secret sharing have been developed which include the implementation of distributed storage
Data Loading...