Font Size: a A A

Research On Secret Sharing Theory And Its Applications

Posted on:2014-07-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:C Q HuFull Text:PDF
GTID:1268330392472203Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Secret sharing plays a significant role in protecting secret information frombecoming lost, being destroyed/altered, or falling into the wrong hands. Meanwhile, theresearchers have also employed secret sharing to solve the above problems. Thus, secretsharing has become one of the most important research areas in modern cryptography,which could ensure information security and data privacy.This dissertation focuses on research of secret sharing theory and its application.First, this dissertation reviews the secret sharing technology, and analyzes thecharacteristics of the existing secret sharing schemes; Meanwhile, this dissertationintroduces the applications based on the scheme. Second, according to thecharacteristics of Body Area Networks, a secure and efficient Fuzzy Attribute-basedsigncryption, which is related with secret sharing, is designed to ensure the securecommunication between the BAN controller and external users, and then, two protocolsare designed to securely retrieve the sensitive patient data from a BAN and instruct thesensors in a BAN. Additionally, based on the secret sharing scheme, image secretsharing scheme is proposed to solve the image security issues in this dissertation.Finally, the summarization of the research on secret sharing is presented, and the trendof future research on secret sharing is also given. The main contributions of thedissertation are as follows:①A summarization is given to cover common idea of secret sharing, and then, averifiable Multi-secret sharing scheme is degigned i.e. Verifiable Multi-secret sharingbased on LFSR sequences. In this scheme, the secrets are hidden into the polynomial;the participants choose their own shadows, and make it impossible for the dealer tocheat them. Therefore, we do not need to verify the validity of the dealer②Body Area Networking is a promising technology for real-time monitoring ofphysiological signals to support various medical applicatons and modern wars. Forexample, modern wars are fought in both physical and cyber-space. The sensitive natureof the data collected makes BANs be a target for malicious entities to exploit. Lack ofadequate security features may not only lead to a breach of soldier’s privacy, but alsomay enable a malicious entity to modify data from the BAN to mislead the fieldcommanders and medical staff. In order to ensure the security of the privacy of thepatient or soldier, a fuzzy attribute-based signcryption scheme is designed. This scheme provides a certain level of error-tolerance for the identities. Moreover, the correctness ofthe scheme is theoretically proven and its efficiency and feasibility are also analyzed indetail. Finally, the performance of the scheme in terms of energy consumption andcommunication/computation overhead is evaluated.③Establishing secure communications between BAN sensors and external users isa key to addressing the prevalent security and privacy concerns. The author proposes theprimitive functions to implement a secret-sharing based Ciphertext-PolicyAttribute-Based Encryption (CP_ABE) scheme, which encrypts the data based on anaccess structure specified by the data source, and the author also designs two protocolsto securely retrieve the sensitive patient data from a BAN and instruct the sensors in aBAN. Furthermore, the analysis has also illustrated that the proposed scheme is feasible,which also provide message authenticity, and can counter possible major attacks such ascollusion attacks and battery-draining attacks.④Security for image transmission is a very important issue. If the image isencrypted, the encrypted image losted some part information. The encrypted image willbe not recovered, so in order to solve the problem, a scheme is proposed based onChinese remainder thereom and Logistic map. The algorithm is a lossless image sharingschemes method.⑤Finally, the research work is summarized, and the dissertation presented thetrend of the future research field on secret sharing and its applications in thisdissertation.
Keywords/Search Tags:Secret Sharing, LFSR, Body Area Networks, Bilinear map, Image SecretSharing
PDF Full Text Request
Related items