Simple and Efficient Secret Sharing Schemes for Sharing Data and Image

V. P. Binu,A. Sreekumar
DOI: https://doi.org/10.48550/arXiv.1502.07475
2015-02-26
Abstract:Secret sharing is a new alternative for outsourcing data in a secure <a class="link-external link-http" href="http://way.It" rel="external noopener nofollow">this http URL</a> avoids the need for time consuming encryption decryption process and also the complexity involved in key <a class="link-external link-http" href="http://management.The" rel="external noopener nofollow">this http URL</a> data must also be protected from untrusted cloud service <a class="link-external link-http" href="http://providers.Secret" rel="external noopener nofollow">this http URL</a> sharing based solution provides secure information dispersal by making shares of the original data and distribute them among different <a class="link-external link-http" href="http://servers.Data" rel="external noopener nofollow">this http URL</a> from the threshold number of servers can be used to reconstruct the original <a class="link-external link-http" href="http://data.It" rel="external noopener nofollow">this http URL</a> is often impractical to distribute data among large number of <a class="link-external link-http" href="http://servers.We" rel="external noopener nofollow">this http URL</a> have to achieve a trade off between security and <a class="link-external link-http" href="http://efficiency.An" rel="external noopener nofollow">this http URL</a> optimal choice is to use a $(2,3)$ or $(2,4)$ threshold secret sharing scheme, where the data are distributed as shares among three or four servers and shares from any two can be used to construct the original <a class="link-external link-http" href="http://data.This" rel="external noopener nofollow">this http URL</a> provides both security,reliability and <a class="link-external link-http" href="http://efficiency.We" rel="external noopener nofollow">this http URL</a> propose some efficient and easy to implement secret sharing schemes in this regard based on number theory and bitwise <a class="link-external link-http" href="http://XOR.These" rel="external noopener nofollow">this http URL</a> schemes are also suitable for secure sharing of <a class="link-external link-http" href="http://images.Secret" rel="external noopener nofollow">this http URL</a> image sharing based on Shamir's schemes are lossy and involves complicated Lagrange <a class="link-external link-http" href="http://interpolation.So" rel="external noopener nofollow">this http URL</a> the proposed scheme can also be effectively utilized for lossless sharing of secret images.
Cryptography and Security
What problem does this paper attempt to address?