Skip to main content
Log in

3-D plane based extended Shamir’s secret sharing

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Secret sharing scheme(s) use the method of splitting shares of a given secret to a reliable set of participants. These constituents of the secret are meaningless when used on their own, but when combined, they reconstruct the secret. Shamir’s secret sharing scheme introduced by Adi Shamir uses the concept that all or some of the participants are required in order to reconstruct the secret. This paper extends the Shamir’s secret sharing scheme by exploiting the use of three dimensional planes to share the secret to increase security and decrease the attacks possible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Forouzan Behrouz A, Debdeep M (2011) Cryptography and network security (Sie). McGraw-Hill Education, New York

    Google Scholar 

  2. William S (2006) Cryptography and network security, 4/E. Pearson Education India, Delhi

    Google Scholar 

  3. Amos B (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science

    Google Scholar 

  4. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  5. Pang L-J, Wang Y-M (2005) A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl Math Comput 167(2):840–848

    Article  MathSciNet  Google Scholar 

  6. Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48

  7. Kothari Suresh C (1984) Generalized linear threshold scheme. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg

  8. Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE

  9. Deshmukh M, Nain N, Ahmed M (2017) A novel approach of an (n, n) multi-secret image sharing scheme using additive modulo. In: Proceedings of international conference on computer vision and image processing. Springer, Singapore

  10. Deshmukh M, Nain N, Ahmed M (2016) Enhanced modulo based multi secret image sharing scheme. In: International conference on information systems security. Springer

  11. Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In: 2016 international conference on information technology (ICIT). IEEE

  12. Rajput M et al (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consum Electron Mag 7(5):40–45

    Article  Google Scholar 

  13. Chen C-C, Wen-Yin F, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577

    MathSciNet  Google Scholar 

  14. Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn (Part III Fundam Electron Sci) 72(9):56–64

    Article  MathSciNet  Google Scholar 

  15. Benaloh J, Leichter J (1990) Generalized secret sharing and monotone functions. In: Proceedings on advances in cryptology. Springer-Verlag New York, Inc

  16. Simmons Gustavus J (1989) Prepositioned shared secret and/or shared control schemes. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, Heidelberg

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maroti Deshmukh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agarwal, A., Deshmukh, M. 3-D plane based extended Shamir’s secret sharing. Int. j. inf. tecnol. 13, 609–612 (2021). https://doi.org/10.1007/s41870-020-00607-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-020-00607-5

Keywords

Navigation