Abstract
In the paper will be described a few most important aspects connected with innovative secret sharing procedures, and also an idea of linguistic cryptography in processes of data encryption. The most important aspects are using parts of divided data to finally reconstruction them. Linguistic algorithms dedicated to securing data as well as secret sharing techniques, are also very useful to guarantee data security. Secret sharing algorithms allow to distribute information within a separate group of secret trustees. In this paper authors describe techniques of using that methods for linguistic data sharing techniques. Authors propose also captcha analysis for linguistic threshold schemes. All secret parts of data can be written by used any parts of selected captcha.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intel. 226, 13–20 (2009)
Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13577-4_15
Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)
Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intel. 309, 347–369 (2010)
Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science, in advances in cognitive information systems. Cogn. Syst. Monogr. 17, 1–18 (2012)
Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: The 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, Hainan Island, China, 13–15 December 2008, vol. 1, pp. 377–380 (2008)
Ohkawara, T., Aikebaier, A., Enokido, T., Takizawa, M.: Quorum-based synchronization protocols for multimedia replicas. Int. J. Cluster Comput. 16(4), 979–988 (2013)
Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58–69 (2013)
Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, 10–12 September 2014, pp. 257–261 (2014)
Ogiela, L., Ogiela, M.R.: Management information systems. In: Park, J., Pan, Y., Chao, H.-C., Yi, G. (eds.) Ubiquitous Computing Application and Wireless Sensor. LNEE, vol. 331, pp. 449–456. Springer, Dordrecht (2015). doi:10.1007/978-94-017-9618-7_44
Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3), 100–109 (2014)
Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)
Ogiela, M.R., Ogiela, U.: Secure information management using linguistic threshold approach. In: Advanced Information and Knowledge Processing. Springer, London (2014)
Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: Communication in Computer and Information Science, vol. 58, pp. 35–42 (2009)
Acknowledgments
This work was partially supported by JSPS KAKENHI grant number 15H0295.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ogiela, U., Takizawa, M., Ogiela, L. (2018). Security of Selected Secret Sharing Schemes. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-61542-4_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61541-7
Online ISBN: 978-3-319-61542-4
eBook Packages: EngineeringEngineering (R0)