A multisecret sharing scheme for color images based on cellular automata

In this work a new multisecret sharing scheme for secret color images among a set of users is proposed. The protocol allows that each participant in the scheme to share a secret color image with the rest of participants in such a way that all of them can recover all the secret color images only if the whole set of participants pools their shadows. The proposed scheme is based on the use of bidimensional reversible cellular automata with memory. The security of the scheme is studied and it is proved that the protocol is ideal and perfect and that it resists the most important statistical attacks.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[3]  Ángel Martín del Rey,et al.  Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators , 2003 .

[4]  Zhenfu Cao,et al.  Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..

[5]  Ali Aydin Selçuk,et al.  Threshold cryptography based on Asmuth-Bloom secret sharing , 2007, Inf. Sci..

[6]  Ed Dawson,et al.  Multistage secret sharing based on one-way function , 1994 .

[7]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[8]  Willi Meier,et al.  Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.

[9]  Hiroki Koga,et al.  Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels , 2006, Des. Codes Cryptogr..

[10]  N. Margolus,et al.  Invertible cellular automata: a review , 1991 .

[11]  Stephen Wolfram Cryptography with Cellular Automata , 1985, CRYPTO.

[12]  Edward Fredkin,et al.  Digital mechanics , 1991 .

[13]  Puhua Guan,et al.  Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..

[14]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[15]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[16]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  L. Harn Efficient sharing (broadcasting) of multiple secrets , 1995 .

[19]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[20]  Ramón Alonso-Sanz,et al.  Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .

[21]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[22]  Yen-Ping Chu,et al.  A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..

[23]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[24]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[25]  Ángel Martín del Rey,et al.  A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata , 2005, IbPRIA.

[26]  L. Harn,et al.  Comment on "Multistage secret sharing based on one-way function" , 1995 .

[27]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[28]  Lakhmi C. Jain,et al.  Multiuser-based shadow watermark extraction system , 2007, Inf. Sci..

[29]  E. Fredkin Digital mechanics: an informational process based on reversible universal cellular automata , 1990 .

[30]  Ángel Martín del Rey,et al.  The Use of Linear Hybrid Cellular Automata as Pseudo Random Bit Generators in Cryptography , 2004, Neural Parallel Sci. Comput..

[31]  Chin-Chen Chang,et al.  An on-line secret sharing scheme for multi-secrets , 1998, Comput. Commun..

[32]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[33]  Wen-Guey Tzeng,et al.  Optimal resilient threshold GQ signatures , 2007, Inf. Sci..

[34]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[35]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[36]  Feng Bao Cryptanalysis of a Partially Known Cellular Automata Cryptosystem , 2004, IEEE Trans. Computers.

[37]  Chin-Chen Chang,et al.  Sharing multiple secrets in digital images , 2002, J. Syst. Softw..

[38]  Santanu Chattopadhyay,et al.  Additive cellular automata : theory and applications , 1997 .

[39]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.