Cryptography Reference
In-Depth Information
14.3 Approaches for Image Sharing
14.3.1 Shamir's Secret Sharing Scheme
Shamir's secret sharing scheme is based on the Lagrange interpolation [2].
Given a set of points (xi, i ;y i )(i = 0; 1; 2;:::;k), the Lagrange interpolation
polynomial L k (x) can be constructed using:
k X
k Y
xx i
x j x i
f k (x) =
y i
(14.2)
i = 0
j=0;i6=j
Given a secret, it can be easily shared using this interpolation scheme. If
GF(q) denotes a Galois field (q > n), the following polynomial is constructed
by choosing proper coecients a 0 , a 1 , , a k from GF(q), which satisfy:
k X
f k (x) = s +
a i x i
(14.3)
i=0
where s is the secret key. The coecients are randomly chosen over the
integers [0;q) and the details are provided in [2]. Suppose s i = f(ai),(i i ),(i =
0; 1; ;k), each S i is known as a share and they all can be delivered to
different persons.
Now we would like to reconstruct the original secret. Suppose k people
have provided their shares si, i , (i = 0; 1; ;k). The following Lagrange inter-
polation polynomial is utilized to reconstruct the original secret:
k X
k Y
aa i
a j a i
P k (x) =
s i
(14.4)
i=0
j=0;i6=j
where addition, subtraction, multiplication, and division are defined over
GF(q).
P k (a i ) = s i ; i = 0; 1; 2; ;k; s = P k (0);
(14.5)
Thus, we can obtain the original secret s [1][2].
14.3.2 Color Image Sharing Based on the Lagrange Interpo-
lation
When an image is treated as a secret, we can share the secret based on the
Lagrange interpolation. We consider the image to be a matrix; and Lagrange
interpolation is generalized for matrices.
We assume a grayscale image corresponds to a matrix A. Given ma-
trix A i = (a i w;h ) WH , where w and h are integer (w = 1; 2; ;W; h =
 
 
Search WWH ::




Custom Search