Linguistic Approach to Cryptographic Data Sharing

In the paper will be presented a new way of secret sharing algorithms expansion towards additional, linguistic stage, for the generation of the secret linguistic elements. Such a part shall be generated in the form of a linguistic description of the shared data, built by defined context-free grammar. The introduction of linguistic formalism in this scheme will provide additional information required for revealing the secret previously split with any (m, n)-threshold scheme.

[1]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[2]  Tzong-Chen Wu,et al.  A geometric approach for sharing secrets , 1995, Comput. Secur..

[3]  Marten van Dijk A Linear Construction of Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[4]  Gustavus J. Simmons,et al.  How to (Really) Share a Secret , 1988, CRYPTO.

[5]  Marek R. Ogiela,et al.  Modern Computational Intelligence Methods for the Interpretation of Medical Images , 2008, Studies in Computational Intelligence.

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Keith M. Martin,et al.  Geometric secret sharing schemes and their duals , 1994, Des. Codes Cryptogr..

[8]  W. Pedrycz,et al.  Medical Image Understanding Technology , 2005, IEEE Transactions on Neural Networks.

[9]  Wu Tzong-Chen,et al.  Refereed paper: A geometric approach for sharing secrets , 1995 .

[10]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).