A Novel Verifiable Multisecret Sharing Scheme in Wireless Multimedia Sensor Networks

This paper presents a secure and practical verifiable multi-secret sharing scheme with application on multimedia sensor networks. By utilizing the merits of biometric cryptography, the proposed scheme can reliably conceal private information and overcome the shortcoming of the traditional cryptography. Security analysis shows that the proposed scheme provides secure, robust, and trustworthy verification of dealer and participants over insecure wireless multimedia sensor networks.

[1]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[3]  Hung-Yu Chien,et al.  A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .

[4]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[5]  Massoud Hadian Dehkordi,et al.  An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.

[6]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[7]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[8]  Sun Qian,et al.  A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .

[9]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[10]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[11]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[12]  Rong Zhao,et al.  A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.

[13]  David Zhang,et al.  A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.

[14]  Liangliang Xiao,et al.  Linear multi-secret sharing schemes based on multi-party computation , 2006, Finite Fields Their Appl..

[15]  Min-Shiang Hwang,et al.  A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..

[16]  Yen-Ping Chu,et al.  A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..

[17]  Zhenfu Cao,et al.  A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..

[18]  Chin-Chen Chang,et al.  A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..

[19]  Muhammad Khurram Khan,et al.  Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks , 2011, Sensors.

[20]  Ning Zhang,et al.  Resource-efficient authentic key establishment in heterogeneous wireless sensor networks , 2013, J. Parallel Distributed Comput..

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.