A Novel Secret Sharing Scheme from Audio Perspective

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
A Perfect Threshold Secret Sharing Scheme to Identify Cheaters Marco Carpentieri Designs, Codes and Cryptography 5(3): , May 1995 Presented by Po-Kun.
Ch12. Secret Sharing Schemes
Secret Sharing Algorithms
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Linear Equations in Linear Algebra
INDR 262 INTRODUCTION TO OPTIMIZATION METHODS LINEAR ALGEBRA INDR 262 Metin Türkay 1.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
A matrix equation has the same solution set as the vector equation which has the same solution set as the linear system whose augmented matrix is Therefore:
1 1.3 © 2012 Pearson Education, Inc. Linear Equations in Linear Algebra VECTOR EQUATIONS.
Yaomin Jin Design of Experiments Morris Method.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Vector Norms and the related Matrix Norms. Properties of a Vector Norm: Euclidean Vector Norm: Riemannian metric:
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Chapter 3 Determinants Linear Algebra. Ch03_2 3.1 Introduction to Determinants Definition The determinant of a 2  2 matrix A is denoted |A| and is given.
Section 2.3 Properties of Solution Sets
Eurostat Statistical matching when samples are drawn according to complex survey designs Training Course «Statistical Matching» Rome, 6-8 November 2013.
An Easy Method to Implement Audio Cryptography Schemes without Computing Devices Shin Yan Chiou and Chi Sung Laih Department of Electrical Engineering,
Chapter 10 Real Inner Products and Least-Square
The Pennsylvania State University CSE597B: Special Topics in Network and Systems Security The Miscellaneous Instructor: Sencun Zhu.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
Linear Algebra Engineering Mathematics-I. Linear Systems in Two Unknowns Engineering Mathematics-I.
1 Objective To provide background material in support of topics in Digital Image Processing that are based on matrices and/or vectors. Review Matrices.
Matrices, Vectors, Determinants.
Advanced Algorithms Analysis and Design By Dr. Nazir Ahmad Zafar Dr Nazir A. Zafar Advanced Algorithms Analysis and Design.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
REVIEW Linear Combinations Given vectors and given scalars
Matrices Introduction.
Cryptographic Protocols Secret sharing, Threshold Security
Matrices and Vector Concepts
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Chapter 4 Systems of Linear Equations; Matrices
A Simple Provably Secure AKE from the LWE Problem
Perfect Secret Sharing Schemes
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Ch12. Secret Sharing Schemes
5 Systems of Linear Equations and Matrices
L9Matrix and linear equation
First order non linear pde’s
Advanced Protocols.
Class Notes 7: High Order Linear Differential Equation Homogeneous
Attack on Fully Homomorphic Encryption over Principal Ideal Lattice
Fuzzy Identity Based Encryption
Linear Equations in Linear Algebra
Source: Signal Processing 109 (2015) 317–333
Sudocodes Fast measurement and reconstruction of sparse signals
§1-3 Solution of a Dynamical Equation
Secret Sharing Schemes using Visual Cryptography
1.3 Vector Equations.
Improved Visual Secret Sharing Scheme for QR Code Applications
Linear Algebra Lecture 39.
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Masayuki Fukumitsu Hokkaido Information University, Japan
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
A Secret Enriched Visual Cryptography
Maths for Signals and Systems Linear Algebra in Engineering Lectures 4-5, Tuesday 18th October 2016 DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN.
Some New Issues on Secret Sharing Schemes
Cryptology Design Fundamentals
Sudocodes Fast measurement and reconstruction of sparse signals
Unfolding with system identification
Optimal XOR based (2,n)-Visual Cryptography Schemes
Secret Image Sharing Based on Encrypted Pixels
2. Perfect Secret Encryption
Cryptographic Protocols Secret Sharing, Threshold Security
Adopting secret sharing for reversible data hiding in encrypted images
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

A Novel Secret Sharing Scheme from Audio Perspective In The Name of Allah A Novel Secret Sharing Scheme from Audio Perspective Mohammad Ehdaie mohammad@ehdaie.com Taraneh Eghlidos teghlidos@sharif.edu Mohammad Reza Aref aref@sharif.edu Sharif University of Technology, Tehran, Iran

M. Ehdaie, T. Eghlidos, M.R. Aref Contents Introduction Preliminaries Shares Generation Secret Reconstruction Security Simulation Ideality & Practical Issues Discussions and Results Conclusions & Further Research References Q & A Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Secret Sharing Definition: Secret sharing is a method to distribute a secret between some participants such that particular subsets (i.e. authorized subsets) could obtain the secret, whereas unauthorized subsets could not. Significance: The risk of fully authorizing a person The risk of Information Disruption Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Terminology Threshold Scheme Cardinality of all minimum allowed subsets, k, is constant. Perfect Scheme Unauthorized subsets could not get any information about the secret by pooling their shares together. Ideal Scheme The size of each share is equal to the size of the secret. Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref The History Geometric Scheme, Blakley, 1979 Interpolation Scheme, Shamir, 1979 … Visual Secret Sharing, Naor & Shamir, 1994 Audio Secret Sharing, Desmedt et al., 1998 Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Motivation What is an Audio Secret Sharing Scheme (ASSS)? Audio Shares and/or Audio Secret Why? Audio Applications … Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Previous Works - Ultimate Goal The Scheme DHQ LLY Goal Threshold (2, n) (k, n) Perfect  Without Computation Ideal  Audio Shares Audio Secret Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Preliminaries The audio file F corresponds to an Amplitude Vector A. Vector c*A corresponds to the amplified audio file F with the coefficient c. Playing two audio files simultaneously, leads to an audio file which corresponds to the sum of their corresponding vectors. If a*A + b*B = c*C, then we can hear the amplified C by playing simultaneously amplified A & B with the coefficients a & b respectively. Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Setup divide the audio secret file into some small intervals. generate the shares in each interval independently. put all share parts of each participant together and generate an audio share. Let A be the amplitude of the secret file in a particular interval. Let S1, S2, …, Sn be the amplitudes of the n share files in the same interval. Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Shares Generation Generate S1, S2, …, Sk-1 Randomly. Generate an (n-k+1)×k matrix with non-zero random elements: Return to step 2, if C contains any singular submatrix. For , compute Si from the equation below: Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Secret Reconstruction (1) Lemma: Assume are k participants who want to reconstruct the secret. There is a linear combination of equations ek, ek+1, …, en leading to an equation of the form below: Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Secret Reconstruction (2) Proof: Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Security (1) Lemma: There is no linear combination of equations ek, ek+1, …, en, such that the coefficients of only k-1 or fewer shares are nonzero. Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Security (2) Proof: Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Simulation The audio secret The noisy reconstructed secret The reconstructed secret One of the shares Another share Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Ideality & Practical Issues The file size of the secret = The file size of each share Practical Issues: Physical properties of amplifiers … Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

Discussions and Results The Scheme DHQ LLY New Threshold (2, n) (k, n) Perfect  Secure Without Computation Ideal  It seems to be Ideal Audio Shares Audio Secret Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Conclusions A new audio secret sharing scheme Secure and it seems to be ideal (k, n) threshold scheme Audio shares and audio secret Secret reconstruction without any computation Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref Further Research Generation of non-suspicious shares Implementation and summing up practical issues Extending the new scheme to the visual case Perfectness & Ideality proof from Information Theoretical view Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref

M. Ehdaie, T. Eghlidos, M.R. Aref References Shamir A., "How to share a secret", Comm. ACM 22, pp. 612-613, (1979). Blakley G. R., "Safeguarding cryptographic keys", Proc. of the National Computer Conf., v. 48, pp. 242-268, (1979). Naor M., Shamir A., "Visual cryptography", Eurocrypt 94, pp. 1-12. Desmedt Y., Hou S., Quisquater J., "Audio and optical cryptography", in Advances in Cryptology-Asiacrypt ’98, Springer-Verlag LNCS, pp. 392-404. Lin C. C., Laih C. S., Yang C. N., "New Audio Secret Sharing Schemes With Time Division Technique", J. of Information Science and Engineering 19, 605-614 (2003). Wednesday, April 10, 2019Wednesday, April 10, 2019 M. Ehdaie, T. Eghlidos, M.R. Aref