Skip to main content

Security of Selected Secret Sharing Schemes

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017)

Abstract

In the paper will be described a few most important aspects connected with innovative secret sharing procedures, and also an idea of linguistic cryptography in processes of data encryption. The most important aspects are using parts of divided data to finally reconstruction them. Linguistic algorithms dedicated to securing data as well as secret sharing techniques, are also very useful to guarantee data security. Secret sharing algorithms allow to distribute information within a separate group of secret trustees. In this paper authors describe techniques of using that methods for linguistic data sharing techniques. Authors propose also captcha analysis for linguistic threshold schemes. All secret parts of data can be written by used any parts of selected captcha.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intel. 226, 13–20 (2009)

    MATH  Google Scholar 

  2. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13577-4_15

    Chapter  Google Scholar 

  3. Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)

    MATH  Google Scholar 

  4. Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intel. 309, 347–369 (2010)

    Google Scholar 

  5. Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science, in advances in cognitive information systems. Cogn. Syst. Monogr. 17, 1–18 (2012)

    Article  MATH  Google Scholar 

  6. Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: The 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, Hainan Island, China, 13–15 December 2008, vol. 1, pp. 377–380 (2008)

    Google Scholar 

  7. Ohkawara, T., Aikebaier, A., Enokido, T., Takizawa, M.: Quorum-based synchronization protocols for multimedia replicas. Int. J. Cluster Comput. 16(4), 979–988 (2013)

    Article  Google Scholar 

  8. Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58–69 (2013)

    Article  Google Scholar 

  9. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, 10–12 September 2014, pp. 257–261 (2014)

    Google Scholar 

  10. Ogiela, L., Ogiela, M.R.: Management information systems. In: Park, J., Pan, Y., Chao, H.-C., Yi, G. (eds.) Ubiquitous Computing Application and Wireless Sensor. LNEE, vol. 331, pp. 449–456. Springer, Dordrecht (2015). doi:10.1007/978-94-017-9618-7_44

    Google Scholar 

  11. Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3), 100–109 (2014)

    Article  Google Scholar 

  12. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)

    Google Scholar 

  13. Ogiela, M.R., Ogiela, U.: Secure information management using linguistic threshold approach. In: Advanced Information and Knowledge Processing. Springer, London (2014)

    Google Scholar 

  14. Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: Communication in Computer and Information Science, vol. 58, pp. 35–42 (2009)

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by JSPS KAKENHI grant number 15H0295.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lidia Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Ogiela, U., Takizawa, M., Ogiela, L. (2018). Security of Selected Secret Sharing Schemes. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61542-4_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61541-7

  • Online ISBN: 978-3-319-61542-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics