作者: Xiaotian Wu , Ching-Nung Yang , Jian-Ming Li
DOI: 10.1016/J.SIGPRO.2020.107768
关键词: Theoretical computer science 、 Cloud computing 、 Secret sharing 、 Protocol (object-oriented programming) 、 Property (programming) 、 Computer science 、 Key distribution 、 Image (mathematics)
摘要: Abstract A (k, n)-threshold secret image sharing (SIS) scheme protects a by dividing it into n shadow images. When any k or more images are collected, the is reconstructed. While ( − 1 ) fewer shadows give no clue about secret. However, all previous SIS schemes do not deal with secure recovery over distributed cloud network (DCN). To achieve goal that reconstructing DCN, private communication channels among involved participants holding required. naive solution for this problem to use an extra key distribution protocol delivers common participants. In paper, two n)-SIS DCN (SISDCN) introduced, where threshold property (recover from images) and reconstruction (noninteractively share participants) provided. Further, theoretical analysis, experiments comparisons conducted show effectiveness advantages of proposed schemes.