Font Size: a A A

Verifiable Threshold Secret Sharing Technology Research Based On One-way Hash Function

Posted on:2017-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:R L LiFull Text:PDF
GTID:2308330485489368Subject:Computer technology
Abstract/Summary:PDF Full Text Request
After Shamir first proposed the idea of secret sharing, related experts and scholars began in-depth and extensive study and explore the system of secret sharing, and achieved very fruitful results. More secret sharing theory model and specific experiment scheme were put forward and its scope of application also become more and more widely. Starting from the practical application value, the threshold secret sharing scheme is the most widely used and widely shared secret sharing scheme. From the point of view of practical value, this paper makes a more in-depth and extensive research and Discussion on the technology of verifiable threshold secret sharing based on one-way hash function.This paper studies the research background and significance, development situation and application research of the secret sharing system, discusses the existing common secret sharing scheme, and discusses the existing common secret sharing scheme, then points out the existing problems of the threshold secret sharing scheme based on traditional carrier image block idea. Safe and effective verifiable threshold secret sharing scheme that can cope with the different practical problems is designed in this paper. The main work and results obtained from the researches of this paper are summarized as follows:a) An efficient adaptive verifiable secret sharing with steganography and tamper resistant scheme is proposed in this paper. A bit sequence is the input of secret sharing which can be generated after differential Huffman lossless compression of secret image in this scheme. At the same time, the use of the one-way hash function to carry out verification with secret sharing and to reduce the complexity of the certified value calculation effectively. Then this method redefines the polynomial calculation formula of the input value, enhances the relevance of the pixels of the secret image to prevent dishonest participants malicious tampering with images, and enhance the security of steganography image. Finally, Theoretical analysis and experimental results demonstrate the effectiveness of the proposed scheme.b) A verifiable threshold secret sharing scheme based on trusted center is proposed in this paper. The technology introduces the idea of tree graph transformation image preprocessing, and uses the information hiding mode of reverse thinking and one-way hash function to enhance the quality of the image and improve the verification. The trusted center can extract the hidden verification information and secret sharing information by comparing the pseudo share and the original carrier image submitted by the participants, which can verify the correctness of the pseudo share and get the original secret image. The both of theoretical analysis and experimental results show that a high quality of steganographic image with efficient verifiability and security can be obtained through the scheme. For secret image for risk management, with a low distortion, high safety and verifiability. And the operation is simple, convenient, has a strong practicability.
Keywords/Search Tags:Threshold secret sharing, Verifiable, One-way hash function, Trusted center
PDF Full Text Request
Related items