Research article Special Issues

Reducing file size and time complexity in secret sharing based document protection

  • Recently, Tu and Hsu proposed a secret sharing based document protecting scheme. In their scheme, a document is encrypted into n shares using Shamir's (k,n) secret sharing, where the n shares are tied in with a cover document. The document reconstruction can be accomplished by acknowledgement of any k shares and the cover document. In this work, we construct a new document protecting scheme which is extended from Tu-Hsu's work. In Tu-Hsu's approach, each inner code of secret document takes one byte length, and shares are generated from all inner codes with the computation in GF(257), where 257 is a Fermat Prime that satisfies 257=223+1. However, the share size expands when it equals to 255 or 256. In our scheme, each two inner codes of document is combined into one double-bytes inner code, and shares are generated from these combined inner codes with the computation in GF(65537) instead, where 65537 is also a Fermat Prime that satisfies 65537=224+1. Using this approach, the share size in our scheme can be reduced from Tu-Hsu's scheme. In addition, since the number of combined inner codes is half of the inner codes number in Tu-Hsu's scheme, our scheme is capable of saving almost half running time for share generation and document reconstruction from Tu-Hsu's scheme.

    Citation: Yan-Xiao Liu, Ya-Ze Zhang, Ching-Nung Yang. Reducing file size and time complexity in secret sharing based document protection[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4802-4817. doi: 10.3934/mbe.2019242

    Related Papers:

    [1] Ching-Chun Chang, Chang-Tsun Li . Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Mathematical Biosciences and Engineering, 2019, 16(5): 3367-3381. doi: 10.3934/mbe.2019168
    [2] Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093
    [3] Li-na Zhang, Chen-yu Cui, Xiao-yu Zhang, Wei Wu . Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering, 2022, 19(12): 12160-12179. doi: 10.3934/mbe.2022566
    [4] Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song . Ramp secret image sharing. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221
    [5] Qi Wang, John Blesswin A, T Manoranjitham, P Akilandeswari, Selva Mary G, Shubhangi Suryawanshi, Catherine Esther Karunya A . Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885
    [6] Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055
    [7] Li-na Zhang, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, Jing Zhang . Two-level QR code scheme based on region matrix image secret sharing algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16678-16704. doi: 10.3934/mbe.2023743
    [8] Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287
    [9] Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang . A novel secret sharing scheme using multiple share images. Mathematical Biosciences and Engineering, 2019, 16(6): 6350-6366. doi: 10.3934/mbe.2019317
    [10] Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318
  • Recently, Tu and Hsu proposed a secret sharing based document protecting scheme. In their scheme, a document is encrypted into n shares using Shamir's (k,n) secret sharing, where the n shares are tied in with a cover document. The document reconstruction can be accomplished by acknowledgement of any k shares and the cover document. In this work, we construct a new document protecting scheme which is extended from Tu-Hsu's work. In Tu-Hsu's approach, each inner code of secret document takes one byte length, and shares are generated from all inner codes with the computation in GF(257), where 257 is a Fermat Prime that satisfies 257=223+1. However, the share size expands when it equals to 255 or 256. In our scheme, each two inner codes of document is combined into one double-bytes inner code, and shares are generated from these combined inner codes with the computation in GF(65537) instead, where 65537 is also a Fermat Prime that satisfies 65537=224+1. Using this approach, the share size in our scheme can be reduced from Tu-Hsu's scheme. In addition, since the number of combined inner codes is half of the inner codes number in Tu-Hsu's scheme, our scheme is capable of saving almost half running time for share generation and document reconstruction from Tu-Hsu's scheme.


    The rapid development of network technology has brought us into the era of informationization. The Internet facilitates the exchange of information with others, various web applications [1,2] greatly facilitate people's daily life. However, information security has become a major issue in the communication via Internet. Many approaches can be employed to protect secret information. (k,n) Secret sharing scheme is an important issue in cryptography which provides an efficient way to safely keeping secret key. In (k,n) Secret sharing, a secret is encrypted into n shares in such a way that any group of at least k shares can recover the secret and less than k shares get nothing on this secret. There are different approaches to achieve secret sharing, for instance, Shamir's scheme [3] was based on polynomial; Blakley's scheme [4] was based on geometry, and Chinese Reminder Theorem was another approach for secret sharing schemes [5,6].

    Many kinds of digital information can be regarded as secret key that can be protected using Shamir's secret sharing scheme. For instance, (k,n) secret image sharing schemes [7,8,9] takes digital image as secret key, and encrypts it into meaningless shadows such that k or more shadows can reconstruct the image, less than k shadows get nothing on the secret image. In 2014, Tu and Hsu proposed a novel document protecting scheme [10] which is based on Shamir's (k,n) secret sharing. In their scheme, a secret document is regarded as secret key and is encrypted into n shares via a cover document, both at least k shares and cover document are necessary to recover the secret document, less than k shares or lack of cover image leads no information on the secret document. Comparing to other secret sharing based document protecting scheme [11,12], Tu-Hsu's scheme has the following advantages. First, the cover document looks innocent that would probably be ignored by hackers. Second, those schemes [11,13] adopts a (n,n) secret sharing scheme, on the contrary, Tu-Hsu's scheme uses (k,n) secret sharing which is more applicable than the schemes [11,13].

    As we know, the size of share is an important issue in secret sharing, since smaller share size can reduce storage and computation cost. Lots of works [14,15,16] addressed the topic of reducing share size in secret sharing based cryptographic schemes. The share in Tu-Hsu's scheme is generated byte-wisely in GF(257) from all inner codes of secret document, where 257 is a Fermat Prime that satisfies 257=223+1. The computation in GF(257) can guarantee that all inner codes can be correctly recovered since it is the smallest prime larger than 28=256. However, the computation in GF(257) would cause share size expansion when the it equals to 255 or 256. In fact, the problem of share size expansion can be solved by using GF(28) [17,18] instead of GF(257), but the time complexity of computation in GF(28) is much higher than running time in GF(257). It needs to transform integers in [0,255] into corresponding polynomials in GF(28), and then the computation between integers is transformed int computation between polynomials (modx8+x4+x3+x+1). Some secret image sharing schemes computed shadows in GF(251) that can resolve the problem of share size expansion, but it would cause image distortion during reconstruction. Therefore the approach of GF(251) can not be adopted in document protecting scheme since each inner code of document should be correctly reconstructed.

    In this paper, we construct a new secret sharing based document protecting scheme which is extended from Tu-Hsu's scheme [10]. In their scheme, all inner codes of secret document are encrypted into shares single byte-wisely in GF(257). Another reasonable choice is using GF(28) rather than the ordinary arithmetic GF(257), i.e., mod 251, to deal with sharing byte-wisely, so that the calculation can process the whole range [0,255]. And, file size is not expanded, because we do not have the values of 255 and 256. However, mathematical calculations in polynomial processing under GF(28) are complicated. If we process not byte-wisely, but deal with N bits each time. Tu-Hsu's approach is based on GF(257), i.e., GF(28+1). Thus, we may use GF(2N+1), where 2N+1 is prime. In fact, the value of 257 in Tu-Hsu's approach is a Fermat prime. As we know, the only known Fermat primes are 3,5,17,257, and 65537, where N is 1,2,4,8, and 16, respectively. Our motivation is still using a simple modular arithmetic, modularizing a Fermat prime. Different from their approach, our scheme combines each two inner codes of secret document into a new double-bytes inner code (i.e., N=16), and all these double-byte inner codes are encrypted into shares with computation in GF(65537), where 65537 is also a Fermat prime that equals to 224+1. Using our approach, each share takes two bytes storage space which can be read and stored efficiently in programs and the share size can be reduced from Tu-Hsu's scheme. On the other hand, the number of combined inner codes in secret document is half of inner codes number using Tu-Hsu's approach, thus the time complexity in our scheme is expected half of Tu-Hsu's approach, experimental results demonstrate that our scheme is capable of saving almost half running time from Tu-Hsu's scheme.

    The rest of this paper is organized as follows. In next section, we introduce Shamir's (k,n) secret sharing scheme, Tu-Hsu's secret sharing based document protecting scheme and definition of Fermat Prime respectively. Our proposed scheme is described in Section 3, and the analysis on share size and running time in our scheme is also discussed in this part. In section 4, the comparisons of share size and running time between our scheme and Tu-Hsu's scheme are shown in the experimental results. The conclusion is made in section 5.

    A (k,n) secret sharing scheme is a method where a secret is encrypted into n shares, in such way that any k or more shares can reconstruct the secret and fewer than k shares get nothing on the secret. More formally, in secret sharing scheme, there exists n users P={P1,P2,...,Pn} and a dealer D. In 1979, Shamir introduced a polynomial based (k,n) secret sharing scheme which is shown in following Scheme 1.

    Scheme 1: Shamir's (k,n) secret sharing scheme

    Sharing phase:

    1 D randomly chooses a k1 degree polynomial f(x)GF(q)[x] which satisfies s=f(0)GF(q). (q is a prime number which satisfies the security requirement)

    2 D selects n different integers x1,x2,...,xn in GF(q) as n different IDs and computes n shares vi=f(xi),i=1,2,...,n.

    3 D sends each share and its ID (vi,xi),i[1,n] to Pi respectively.

    Reconstruction phase:

    1 m(k) users (say P1,P2,...,Pm) pool their shares and IDs (vi,xi),i=1,2,...,m together.

    2 Computing the interpolated polynomial f(x) on (vi,xi),i=1,2,...,m by the following Lagrange equation:

    f(x)=mi=1(vijixxjxixj) (2.1)

    Then the secret s=f(0).

    The Fermat Number is a sequence of integers Ft that satisfies:

    Ft=22t+1,t0 (2.2)

    A prime number N is called Fermat Prime Number, when there exist t0, and satisfies that N=22t+1. F0=1,F1=3,F2=17,F3=257 and F4=65537 are five Fermat Prime Numbers and any Fermat Prime Number Ft for t5 has not been found yet.

    Tu and Hsu constructed a document protecting scheme using Shamir's (k,n) secret sharing. Their scheme can be also divided into Sharing Phase and Reconstruction Phase: During Sharing Phase, a secret document SD was encrypted into n shares on different IDs, where these IDs are generated from a cover document CD; in Reconstruction Phase, acknowledgement of CD and a group of at least k shares can reconstruct SD. Before Sharing Phase, all the words in SD and CD are encoded into inner codes using an appropriate encoding method. We use the notations Si,i=1,2,...,m and Ci,i=1,2,...,l to present the inner codes of SD and CD in byte-wise respectively. Tu-Hsu's scheme is described in following Scheme 2.

    Scheme 2: Tu-Hsu's (k,n) secret sharing based document protecting scheme

    Sharing phase: Input: secret document SD =(S1,S2,...,Sm), cover document CD =(C1,C2,...,Cl); Output: n shares V1,V2,...,Vn

    1 The l inner codes (C1,C2,...,Cl) is divided into multiple n-length blocks B1,B2,...,Bln, where the n inner codes in each block are different. The method for generating these n-length blocks is introduced in following Algorithm 1.

    2 For each k1 inner codes (Sr(k1)+1,Sr(k1)+2,...,Sr(k1)+k1,r=0,1,...,mk1) in SD, D constructs a k1 degree polynomial fr(x)GF(257)[X] using these k1 inner codes as coefficients, and the constant term Ar,0 is randomly selected:

    fr(x)=Ar,0+Sr(k1)+1x+...+Sr(k1)+k1xk1(mod 257) (2.3)

    (The reason for only k1 (not k) inner codes are used as coefficients is to enhance the security level.)

    3 For each polynomial fr(x),r[0,mk1], using n different inner codes xr,j,j=1,2,...,n in B(r+1)modln as different IDs to compute n sub-shares vr,j=fr(xr,j),j=1,2,...,n.

    4 The share Vj,j=1,2,...,n for each user Pj is

    Vj=v1,j||v2,j||...||vmk1,j (2.4)

    Reconstruction phase: Input cover document CD, k shares V1,V2,...,Vk; Output: secret document SD

    1 Obtain the multiple n-length blocks B1,B2,...,Bln from CD using following Algorithm 1.

    2 Reconstructing fr(x),r=0,1,...,mk1 using Lagrange interpolation:

    fr(x)=ki=1(vr,ikj=1,jixxr,jxr,ixr,j) (2.5)

    where xr,i,i[1,k] are the IDs of vr,i that are obtained from B(r+1)modl2n

    3 The last k1 coefficients in fr(x) are k1 corresponding inner codes of SD, thus SD (all inner codes) can be recovered.

    The method of dividing all inner codes in CD into multiple n-length blocks is described in following Algorithm 1. Using Algorithm 1, one can guarantee that the n elements in each block are different.

    Algorithm 1 Dividing CD into multiple n-length blocks
    1 Sort all inner codes (C0,C1,...,Cl1) of CD in ascending order, and (C0,C1,...,Cl1) is sorted inner codes.
    2 Put C1 into B0 and set count=1,m=0
    3 For (j=1 to j=l1)
       {if (Cj>Cj1 or count<l1n)
          {if (Cj==Cj1)
             count=count+1
          else
             count=1}
       m=(m+1)%l1n
       if (|Bm|<n)     / |Bm| denotes the size of Bm /
          put Cj into Bm }

    In Sharing Phase, Tu and Hsu selects the prime 257 in the finite field GF(257) to computing shares and reconstructing document. As introduced previously, 257 is a Fermat Prime that satisfies 257=28+1, it is only 1 larger than 28=256, where 256 is exactly one byte length. Since each inner code of secret document in Tu-Hsu's scheme takes one byte storage space, the share generation and secret reconstruction achieve highest efficiency when the the corresponding computation is in GF(257).

    However, computation in GF(257) would causes some sub-shares equal to 256, that cannot be stored in one byte space. To ensure the correctness of each sub-share, they adopt a special way to present 255 and 256. The sub-share 255 is stored in two bytes 255||0, and sub-share 256 is stored in two bytes 255||1. During Reconstruction phase, when a sub-share is 255, one should know that the next byte is also combined with previous byte. If the value is 0 in next byte, the sub-share is 255, otherwise the sub-share is 256. For instance, if a group of sub-shares is (45,79,255,0,80,178) which is stored in 6 bytes, then there are 5 sub-shares (45,79,255,80,178) in total; if a group of sub-shares is (97,255,1,75) which is stored in 4 bytes, there are 3 sub-shares 97,256,75; if a group of sub-shares is (189,253,94,180) which is stored in 4 bytes, there are 4 sub-shares 189,253,94,180.

    The share size is an important issue in secret sharing scheme. For instance, Shamir's (k,n) secret sharing hides the secret s in one coefficient a0, thus the size of share equals to the size of secret, |V|=|S|; (k,n) secret image sharing scheme uses all k coefficients to hide a group of k pixels, the share size is 1k time of secret image, |V|=|S|k. Tu-Hsu's scheme uses k1 out of k coefficients to hide a group of k1 inner codes of secret document, the theoretical share size is |V|=|S|k1. However, Tu-Hsu's scheme uses GF(257) in share generation, when the share belongs to {0,1,...,254}, it can be stored in one byte, and there is no share size expansion; but when the share equals to 255 or 256, it is stored in two bytes, this would causes share size expansion from the theoretical size.

    In this paper, we aim to construct a new secret sharing based secret document protecting scheme that can reduce share size from Tu-Hsu's scheme. In Tu-Hsu's scheme, all inner codes of secret document are encrypted single-byte wisely in GF(257), and it causes share size expansion when the share equals to 255 or 256. The probability of share size expansion is 2257. Different from their approach, our scheme first combines each two inner codes of secret document into one inner code, where each new inner code in our approach takes double-bytes storage space. Then the shares are generated from this double-bytes inner codes with the computation in GF(65537), and the secret reconstruction is also computed in GF(65537) from double-byte shares. Notice that 65537 is also a Fermat Prime Number which is introduced previously, and 65537 is the only Fermat Prime Number which is larger than 257. The computation in GF(65537) has following advantages:

    1 65537 is only 1 larger than 216=65536, where 63336 is exact two bytes length. Therefore the computation in GF(65537) has high efficiency as the computation in GF(257).

    2 The share size using our approach would expand when the share equals to 65535 or 65536. The probability of share size expansion is 265537, which is much smaller than the probability 2257 of share size expansion in Tu-Hsu's approach. Therefore our scheme can reduce share size from Tu-Hsu's scheme.

    3 The number of inner codes in our approach is half inner codes number in Tu-Hsu's approach, thus our scheme has less time complexity than Tu-Hsu's scheme.

    Our proposed scheme is described in following Scheme 3.

    Scheme 3: Our proposed scheme

    Sharing phase: Input: secret document SD=(S1,S2,...,Sm), cover document CD=(C1,C2,...,Cl); Output: n shares V1,V2,...,Vn

    1 Combine each of two inner codes in SD and CD, thus SD=(S1,S2,...,Sm2) and CD=(C1,C2,...,Cl2). Each new inner code in SD and CD is stored in double-bytes.

    2 Dividing (C1,C2,...,Cl2) into multiple n-length blocks B1,B2,...,Bl2n using Algorithm 1.

    3 For each group of k1 inner codes (Sr(k1)+1,Sr(k1)+2,...,Sr(k1)+k1,r[0,m2(k1)] in SD, D randomly selects an integer Ar,0[0,65536] and generates a k1 degree polynomial fr(x):

    fr(x)=Ar,0+Sr(k1)+1x+...+Sr(k1)+k1xk1(mod 65537) (3.1)

    4 For each polynomial fr(x),r[0,m2(k1)], using n different integers xr,j,j=1,2,...,n in B(r+1)modw as n different IDs to compute n sub-shares vr,j=fr(xr,j),j=1,2,...,n. If a sub-share is 65535 or 65536, it is stored in three bytes where the first double-bytes is set 65535 and the last byte is set 0 or 1 respectively.

    5 The share Vj,j=1,2,...,n for each user Pj is

    Vj=v0,j||v1,j||...||vm2k1,j (3.2)

    Reconstruction phase: Input cover document CD, k shares V1,V2,...,Vk; Output: secret document SD

    1 Obtain the n-length blocks B1,B2,...,Bl2n from CD using Algorithm 1.

    2 Reconstructing the polynomials fr(x),r=0,1,...,m2(k1) using Lagrange interpolation:

    fr(x)=ki=1(vr,ijixxr,jxr,ixr,j) (3.3)

    where xr,i,i[1,k] are the IDs of vr,i that are obtained from B(r+1)modl2n

    3 The last k1 coefficients in fr(x) are k1 inner codes of SD, thus SD (all inner codes) can be recovered correspondingly.

    The difference between our scheme and Tu-Hsu's scheme is that the proposed scheme combines each two bytes of inner codes into a double-bytes block, and computing sub-shares in GF(P) where P=65537. In Tu-Hsu's scheme, sub-shares are computed in GF(257), and the sub-share size expands from one byte to two bytes when the sub-share equals to 255 or 256, the probability that the sub-share equals to 255 or 256 is 2257, thus the theoretical average share size (combined by all sub-shares) is

    |VTuHsu|=|S|257(255k1+2k12)=259|S|257(k1) (3.4)

    In our scheme, the sub-share size expands from double-bytes to three bytes when sub-share equals to 63355 or 65536, the probability that the sub-share equals to 65535 or 65536 is 265537, thus the theoretical average share size (combined by all sub-shares) is

    |VPro|=|S|63357(65535k1+2k132)=65538|S|65537(k1) (3.5)

    It is obvious that |VPro|<|VTuHsu|, therefore our scheme can reduce share size of Tu-Hsu's scheme.

    In addition, since our scheme encrypts secret document double-bytes wisely, the number of inner codes for a secret document in our scheme is 12 times of Tu-Hsu's scheme. As analyzed in [10], the time complexities for share generation and secret document reconstruction is O(hn) and O(hk) respectively, where h denotes the number of inner codes of secret document. Since the multiplications in GF(257) and GF(65537) have similar running time, the time complexities in our scheme are O(hn2) and O(hk2) for share generation and secret document reconstruction respectively. It means that our approach is capable of saving half running time from Tu-Hsu's approach.

    In this section, we use experimental results to show the advantages of our scheme to Tu-Hsu' scheme. Our experiments adopt the same samples in [10] as the secret document and cover document, and three different thresholds (2,5),(3,6),(4,7) secret sharing schemes were implemented on Tu-Hsu's approach and our approach using Matlab language, respectively. The program runs at platform of CPU i5-7300HQ, and 8.0 GB RAM, and the operating system is Window 7 Professional. The share size and running time are compared in three thresholds secret sharing schemes between these two approaches. Figure 1 shows the secret document and cover document, both are in traditional Chinese. Figure 2 lists the inner codes of the secret document (76 bytes) and cover document, which are transformed by the encoding method "Big5".

    Figure 1.  Content of secret document and cover document.
    Figure 2.  Inner codes of secret document and cover document.

    Experiment 1: (2,5) secret sharing based on secret document and cover document using Tu-Hsu's approach and our approach.

    In Experiment 1, the secret document is first encoded into 5 shares using Tu-Hsu's (2,5) secret sharing where the all inner codes of secret document is encrypted single byte-wisely. Then we use our approach to encode secret document into 5 shares where the inner codes are encrypted double-byte wisely. Figure 3 lists the shares that are generated in Tu-Hsu's approach and our approach respectively.

    Figure 3.  Shares in Experiment 1.

    (2,5) secret sharing scheme uses only 1 inner code as a coefficient in polynomials to generating shares, thus the size of share would equals to the size of secret document theoretically. From Figure 3 we can see that the sizes of 5 share using Tu-Hsu's approach are 76,76,77,78,76 bytes respectively. The share size expansion are caused by the three sub-shares 256,256,255 (marked in red), which are stored in two bytes. On the other hand, the sizes of 5 shares using our approach are all 76 bytes, there is no share size expansion using our approach.

    Experiment 2: (3,6) secret sharing based on secret document and cover document using Tu-Hsu's approach and our approach.

    In Experiment 2, secret document is first encoded into 6 shares using Tu-Hsu's (3,6) secret sharing where the all inner codes of secret image is encrypted byte-wisely. Then we use our approach to encode secret document into 6 shares where the inner codes are encrypted double-byte wisely. Figure 4 lists a group of 6 shares that are generated in Tu-Hsu's approach and our approach respectively.

    Figure 4.  Shares in Experiment 2.

    Since both (3,6) secret sharing in Tu-Hsu's approach and our approach takes a group of 2 inner codes as coefficients in a polynomial, the theoretical share size is 12 of the secret document. As listed in Figure 4, share 1 and 5 consists of 39 bytes which is caused by the sub-shares marked in red, and each share in our approach is 38 bytes which equals to 12 of secret document.

    Experiment 3: (4,7) secret sharing based on secret document and cover document using Tu-Hsu's approach and our approach.

    In Experiment 3, secret document is first encoded into 7 shares using Tu-Hsu's (4,7) secret sharing where the all inner codes of secret image is encrypted byte-wisely. Then we use our approach to encode secret document into 7 shares where the inner codes are encrypted double-byte wisely. Figure 5 lists a group of 7 shares that are generated in Tu-Hsu's approach and our approach respectively. We can also observe that the share size in our approach is smaller than the share size in Tu-Hsu' approach.

    Figure 5.  Shares in Experiment 3.

    As we discussed previously, the operations in GF(257) and GF(65537) have similar time complexity, and thus the share encryption and secret reconstruction using our scheme is expected to save 12 running time from Tu-Hsu's approach. To authenticate this assumption, we implement the all previous experiments and a (5,8) secret sharing based secret document protection scheme three times, and record the running times of Tu-Hsu's approach and our approach respectively, the following Table 1 lists all the data from these experiments which includes the total share size, running time for share generation and secret reconstruction.

    Table 1.  Comparisons between Tu-Hsu's approach and our approach.
    ThresholdApproachTotal Share SizeRunning Time (second)
    (byte)Share GenerationSecret Reconstruction
    (1)(2)(3)(1)(2)(3)(1)(2)(3)
    (2,5)Tu-Hsu's3833823830.0070.0070.0110.4480.4230.417
    Our3803803800.0040.0050.0060.2560.2390.217
    (3,6)Tu-Hsu's2302282300.0140.0130.0120.4030.3990.407
    Our2282282280.0060.0080.0090.2270.2630.230
    (4,7)Tu-Hsu's1841841830.0130.0110.0100.4790.4690.455
    Our1821821820.0090.0070.0050.2520.2460.258
    (5,8)Tu-Hsu's1551541550.0160.0140.0150.4890.4950.493
    Our1521521520.0080.0080.0090.2610.2590.258

     | Show Table
    DownLoad: CSV

    The statistical results in Table 1 shows that our approach is capable of reducing share size from Tu-Hsu's approach and also save almost half running time in share generation or secret reconstruction. Next, we use 10 secret documents with different sizes (100 bytes to 1000 bytes) to test the running times for secret reconstruction with three approaches: computations in GF(28),GF(257) and GF(65537) respectively. The following Table 2 lists all the running times for secret reconstruction with three thresholds (2,5),(3,6),(4,7), and Figures 68 show the comparisons of running time between three computation approaches under different threshold respectively. From the comparison we can see that the computation in GF(65537) is capable of saving half running time for secret reconstruction from computation in GF(257) and also reducing the share size. Although the problem of share size expansion can be also solved by the computation in GF(28), the running time in GF(28) is much longer than the computations in GF(257) and GF(65537).

    Table 2.  Running times for secret reconstruction using three approaches.
    Threshold (2,5) (3,6) (4,7)
    Approach GF(257) GF(65537) GF(28) GF(257) GF(65537) GF(28) GF(257) GF(65537) GF(28)
    Size 100 0.58 0.34 5.46 0.59 0.29 3.78 0.63 0.33 3.42
    200 1.15 0.64 11.01 1.15 0.62 8.01 1.27 0.66 7.05
    300 1.86 1.02 16.97 1.88 0.62 11.84 1.88 0.65 9.05
    400 2.13 1.18 17.71 2.06 1.09 13.20 2.29 1.14 12.08
    500 2.68 1.46 21.82 2.46 1.23 16.39 2.76 1.46 14.30
    600 3.47 1.82 27.11 3.27 1.66 22.30 3.58 1.82 20.01
    700 3.99 2.35 36.58 3.92 2.09 26.49 4.79 2.21 24.48
    800 4.58 2.54 42.72 4.43 2.26 30.44 4.89 2.52 26.90
    900 5.21 2.78 46.94 4.93 2.48 34.12 5.36 2.86 30.20
    1000 5.80 3.10 54.24 5.33 2.80 33.33 6.19 3.20 34.40

     | Show Table
    DownLoad: CSV
    Figure 6.  Running time for (2,5) threshold secret reconstruction using three approaches.
    Figure 7.  Running time for (3,6) threshold secret reconstruction using three approaches.
    Figure 8.  Running time for (4,7) threshold secret reconstruction using three approaches.

    This paper proposes a new secret sharing based secret document protection scheme, which is capable of reducing share size and saving running time from Tu-Hsu's scheme. In Tu-Hsu's scheme, all inner codes of a secret document are encrypted single-byte wisely, and the shares are computed through Shamir's (k,n) secret sharing in GF(257). When the share in Tu-Hsu's scheme equals to 255 or 256, the share size is expanded from one byte to two bytes. On the contrary, our scheme combines each two inner codes of secret document in Tu-Hsu' scheme into one double-bytes inner code, and the shares are generated from these double-bytes inner codes through Shamir's (k,n) secret sharing in GF(65537). The share size would expand only when it equals to 65535 or 65536, which has much smaller probability of share size expansion than Tu-Hsu's scheme. Thus, our scheme can reduce share size from Tu-Hsu's scheme. On the other hand, by combining each two inner codes into one double-bytes inner code, our scheme has half computational complexity to Tu-Hsu's scheme, and the experimental results can also prove that our scheme saves almost half running time from Tu-Hsu's scheme.

    This work was supported by National Natural Science Foundation of China under Grant No. 61502384, 61571360, 61872289; This research was supported in part by Ministry of Science and Technology (MOST), under Grant 107-2221-E-259-007.

    The authors declare that they have no conflict of interest.



    [1] Q. D. Sun, N. Wang, Y. D. Zhou, et al., Identification of influential online social network users based on Multi-Features, Int. J. Pattern Recognit. Artif. Intell., 30 (2016), 1–15.
    [2] Q. D. Sun, N. Wang, S. C. Li, et al., Local spatial obesity analysis and estimation using online social network sensors, J. Biomed. Inform., 83 (2018), 54–62.
    [3] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.
    [4] G. R. Blakley, Safeguarding cryptographic keys, AFIPS Conference, 48 (1979), 313–317.
    [5] X. X. Jia, Y. X. Song, D. S. Wang, et al., A collaborative secret sharing scheme based on the Chinese Remainder Theorem, Math. Biosci. Eng., 16 (2019), 1280–1299.
    [6] X. X. Jia, D. S. Wang, D. X. Nie, et al., A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem, Inf. Sci., 473 (2019), 13–30.
    [7] C. C. Thien and J. C. Lin, Secret image sharing, Comput. Graph., 26 (2002), 765–770.
    [8] Y. X. Liu, C. N. Yang, C. M. Wu, et al. Threshold changeable secret image sharing scheme based on interpolation polynomial, Multimed. Tools Appl., (2019), (DOI: 10.1007/s11042-019-7205-4).
    [9] Y. X. Liu and C. N. Yang, Scalable secret image sharing scheme with essential shadows. Signal Process. Image, 58 (2017), 49–55.
    [10] S. F. Tu and C. S. Hsu, Protecting secret documents via a sharing and hiding scheme, Inf. Sci., 279 (2014), 52–59.
    [11] C. C. Chang and T. X. Yu, Sharing a secret gray image in multiple images, First International Symposium on Cyber Worlds, (2002), 230–237.
    [12] D. S. Tsai, G. Horng, T. H. Chen, et al., A novel secret image sharing scheme for true-color images with size constraint, Inf. Sci., 179 (2009), 3247–3254.
    [13] R. Lukac and K.N. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognit., 38 (2005), 767–772.
    [14] Y. X. Liu, C. N. Yang and P. H. Yeh, Reducing shadow size in smooth scalable secret image sharing, Secur. Commun. Netw., 7 (2014), 2237–2244.
    [15] R. Z. Wang and C. H. Su, Secret image sharing with smaller shadow images, Pattern Recogn. Lett., 27 (2006), 551–555.
    [16] C. N. Yang, P. Li, C. C Wu, et al., Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Process. Image, 31 (2015), 1–9.
    [17] C. N. Yang, J. F. Ouyang and L. Harn et al., Steganography and authentication in image sharing without parity bits, Opt. Commun., 285 (2012), 1725–1735.
    [18] C. C. Chen and S. C. Chen, Two-layered structure for optimally essential secret image sharing scheme, J. Vis. Commun. Image R., 38 (2016), 595–601.
  • This article has been cited by:

    1. Ching-Nung Yang, Qin-Dong Sun, Yan-Xiao Liu, Ci-Ming Wu, A n-out-of-n Sharing Digital Image Scheme by Using Color Palette, 2019, 8, 2079-9292, 802, 10.3390/electronics8070802
    2. Ching-Nung Yang, Po-Yu Tsai, Yanxiao Liu, A (k, n) secret document sharing with meaningful shares, 2021, 62, 22142126, 102973, 10.1016/j.jisa.2021.102973
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4549) PDF downloads(474) Cited by(2)

Figures and Tables

Figures(8)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog