Abstract
Secret sharing scheme(s) use the method of splitting shares of a given secret to a reliable set of participants. These constituents of the secret are meaningless when used on their own, but when combined, they reconstruct the secret. Shamir’s secret sharing scheme introduced by Adi Shamir uses the concept that all or some of the participants are required in order to reconstruct the secret. This paper extends the Shamir’s secret sharing scheme by exploiting the use of three dimensional planes to share the secret to increase security and decrease the attacks possible.
Similar content being viewed by others
References
Forouzan Behrouz A, Debdeep M (2011) Cryptography and network security (Sie). McGraw-Hill Education, New York
William S (2006) Cryptography and network security, 4/E. Pearson Education India, Delhi
Amos B (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of technology, Faculty of computer science
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Pang L-J, Wang Y-M (2005) A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl Math Comput 167(2):840–848
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48
Kothari Suresh C (1984) Generalized linear threshold scheme. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg
Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. In: 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE
Deshmukh M, Nain N, Ahmed M (2017) A novel approach of an (n, n) multi-secret image sharing scheme using additive modulo. In: Proceedings of international conference on computer vision and image processing. Springer, Singapore
Deshmukh M, Nain N, Ahmed M (2016) Enhanced modulo based multi secret image sharing scheme. In: International conference on information systems security. Springer
Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In: 2016 international conference on information technology (ICIT). IEEE
Rajput M et al (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consum Electron Mag 7(5):40–45
Chen C-C, Wen-Yin F, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577
Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn (Part III Fundam Electron Sci) 72(9):56–64
Benaloh J, Leichter J (1990) Generalized secret sharing and monotone functions. In: Proceedings on advances in cryptology. Springer-Verlag New York, Inc
Simmons Gustavus J (1989) Prepositioned shared secret and/or shared control schemes. In: Workshop on the theory and application of of cryptographic techniques. Springer, Berlin, Heidelberg
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Agarwal, A., Deshmukh, M. 3-D plane based extended Shamir’s secret sharing. Int. j. inf. tecnol. 13, 609–612 (2021). https://doi.org/10.1007/s41870-020-00607-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-020-00607-5