Cryptography Reference
In-Depth Information
Fig. 4.11. Diagram of (t, n)-VSS shadow generation process for the binary plane
P j .
then combines the sub-shadows to form the shadows, S j,1 ,S j,2 ,,S j,n ,for
the plane P j . The final shadows of the gray-scale image are expressed as
S 1
= S 1,1 2 7 + S 2,1 2 6 ++ S 7,1 2 1 + S 8,1 ,
S 2
= S 1,2 2 7 + S 2,2 2 6 ++ S 7,2 2 1 + S 8,2 ,
.
S n
= S 1,n 2 7 + S 2,n 2 6 ++ S 7,n 2 1 + S 8,n .
4.4.2 The Decryption Process for the (T, N)-VSS Scheme
The scheme decomposes each shadow into eight planes. The reconstruction
process is then performed on those planes to reconstruct the original plane
P j , shown in Fig. 4.12.
In Fig. 4.12, each shadow is separated into 2 k
sub-shadows. The scheme
restores the sub-shadows, a j,χ
1
, a j,χ
2
,, and a j,χ
2 k , to their original locations,
a j,χ
1
, a j,χ
2
,,anda j,χ
2 k , where 1≤χ≤n. The scheme uses the generated n
random sequences to restore the original sub-region. Only legal participants
who own the secret keys can generate the sequences needed to rearrange the
locations of the sub-shadows.
The decryption function for the (t, n)-VSS scheme is next used to decrypt
the secret information. The scheme stacks the sub-shadows, a j,χ
1
, a j,χ
2
,,and
Search WWH ::




Custom Search