2018
DOI: 10.3390/sym10040095
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Secret Sharing Using QR Codes and Symmetric Keys

Abstract: Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR) codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…The same equation could be extended to (2). Most importantly, the XOR operation may be used during recovery.…”
Section: (K N)-threshold Rg-based Vss In the Scheme Of Yan Et Almentioning
confidence: 99%
See 1 more Smart Citation
“…The same equation could be extended to (2). Most importantly, the XOR operation may be used during recovery.…”
Section: (K N)-threshold Rg-based Vss In the Scheme Of Yan Et Almentioning
confidence: 99%
“…Chen et al [1] presented a scheme using QR codes for applications involving security and flexible access structures. Chow et al [2] used cryptographic keys to encrypt QR codes when embedding them into cover QR codes. Fu et al [5] proposed a VSS scheme utilizing the encoding redundancy of QR codes by using a probabilistic sharing method.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have previously proposed the use of QR codes for various applications in computer security. For example, for storing private and public information [22], secret sharing [5], visual cryptography [9], digital watermarking [6] and so on. The methods proposed in this paper are related to zero-based watermarking.…”
Section: Related Workmentioning
confidence: 99%
“…The meaningful QR code pseudoshares reduce malevolent people's attentions with the help of the cheater detection function which makes it difficult to forge a fake QR code pseudo-shares. Chow et al [15] and He et al [16] proposed two QR code secret sharing scheme to improve the security of Chuang's scheme. Their schemes employed the symmetric encryption algorithm to encrypt shares before embedding shares into the meaningful cover QR codes.…”
Section: Introductionmentioning
confidence: 99%