月旦知識庫
月旦知識庫 會員登入元照網路書店月旦品評家
 
 
  1. 熱門:
首頁 臺灣期刊   法律   公行政治   醫事相關   財經   社會學   教育   其他 大陸期刊   核心   重要期刊 DOI文章
國際應用科學與工程學刊 本站僅提供期刊文獻檢索。
  【月旦知識庫】是否收錄該篇全文,敬請【登入】查詢為準。
最新【購點活動】


篇名
Ensuring dealer and participant truthfulness in the audio share generation and reconstruction processes for an audio secret sharing scheme
並列篇名
Ensuring dealer and participant truthfulness in the audio share generation and reconstruction processes for an audio secret sharing scheme
作者 Guttikonda Prashanti (Guttikonda Prashanti)P Ashok Kumar (P Ashok Kumar)Popuri Keerthika (Popuri Keerthika)
英文摘要
Polynomial-based secret sharing is a tool used to secure a secret that is being shared by a group of users. Dealer, through a private channel, distributes shadows of the secret to users in the group, and only the threshold number of users with their shadows can retrieve the secret. However, some users provide fake shadows so that the original secret cannot be retrieved. Identifying such cheating behavior is important while reconstructing the secret. This article introduces a novel method for audio-based secret sharing using polynomials. The proposed technique not only enables the creation of smaller-dimensional audio shares but also incorporates a mechanism to identify untrustworthy participants within the group. Our proposed method employs dual security measures to ensure the integrity and authenticity of the audio-sharing process. Firstly, our method includes a verification process to authenticate whether the dealer has indeed derived the audio share using the participant's true secret value. Through this approach, participants can ensure the integrity and authenticity of the audio shares published by the dealer. Secondly, another set of verification codes is generated to enable participants to validate each other's submitted secret values, preventing fraudulent submissions during the reconstruction process. By employing this dual approach, security is enhanced through the implementation of multiple layers of verification and authentication across the entire process.
起訖頁 1-14
關鍵詞 ChecksumConfidentialityDiscrete logarithmsGeneratorLagrange interpolationUntrustworthy participants
刊名 國際應用科學與工程學刊  
期數 202503 (22:1期)
出版單位 朝陽科技大學理工學院
該期刊-上一篇 Human flow detection using CSI technology combined with STFT and machine learning
該期刊-下一篇 Enhancing cybersecurity vulnerability detection using different machine learning severity prediction models
 

新書閱讀



最新影音


優惠活動




讀者服務專線:+886-2-23756688 傳真:+886-2-23318496
地址:臺北市館前路28 號 7 樓 客服信箱
Copyright © 元照出版 All rights reserved. 版權所有,禁止轉貼節錄