基于QR二维码的秘密共享方案的研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Study on secret sharing scheme based on QR code
  • 作者:李中 ; 曹国震
  • 英文作者:LI Zhong;CAO Guo-zhen;Xi'an Aeronautical University;
  • 关键词:QR二维码 ; 秘密共享 ; 电子商务 ; 对称加密
  • 英文关键词:QR code;;secret sharing;;electronic commerce;;symmetric encryption
  • 中文刊名:GWDZ
  • 英文刊名:Electronic Design Engineering
  • 机构:西安航空学院;
  • 出版日期:2018-07-05
  • 出版单位:电子设计工程
  • 年:2018
  • 期:v.26;No.387
  • 基金:陕西省科技工业公关项目(2016GY-139)
  • 语种:中文;
  • 页:GWDZ201813031
  • 页数:5
  • CN:13
  • ISSN:61-1477/TN
  • 分类号:147-151
摘要
QR二维码由于具有可靠性高、存储量大、扫描速度快等特点得到了广泛的应用。秘密共享作为保护敏感信息的重要工具,可用于多方安全计算、电子商务、导弹控制等领域。然而目前主要的秘密共享方案都需要大量的数值计算,并且需要电子手段分发。本文采用基于QR二维码的编码和解码的方法,设计了一种(n,n)秘密共享方案。由于使用经典的对称加密算法和异或运算,该方案需要的计算量少,执行效率较高,并且与传统的电子分发不同,该方案的秘密份额可以通过印刷媒体进行分发。
        QR code has been widely used because of its high reliability,large storage,fast scanning speed. Secret sharing,as an important tool for protecting sensitive information,can be applied in many fields such as multi-party security computation,electronic commerce,missile control. However,the main secret sharing schemes now require a large number of numerical calculations and need to be distributed electronically. In this paper,a(n,n)secret sharing scheme is designed based on the encoding and decoding method of QR code. Due to the use of classical symmetric encryption algorithm and XOR operation,the scheme have less computation and higher execution efficiency,and unlike the traditional electronic distribution,the secret share of the scheme can be distributed through the print media.
引文
[1]Mashhadi S,Dehkordi M H.Two verifiable multi se-cret sharing schemes based on nonhomogeneouslinear recursion and LFSR public-key cryptosystem[J].Information Sciences,2015(294):31-40.
    [2]Smart N P.Secret Sharing Schemes[M].Cryptogra-phy Made Simple.Springer International Publish-ing,2016.
    [3]Dragan C C,?iplea F L.Distributive WeightedThreshold Secret Sharing Schemes[J].InformationSciences,2016(339):85-97.
    [4]袁理锋.秘密共享技术及其应用的研究[D].大连:大连理工大学,2017.
    [5]Dai S G,Wei J F,Zhang F G.Memory leakage-re-silient secret sharing schemes[J].Science China In-formation Sciences,2015,58(11):1-9.
    [6]Hasegawa S,Isobe S,Iwazaki J Y,et al.AStrengthened Security Notion for Password-Protect-ed Secret Sharing Schemes[J].IEICE Trans Funda-mentals,2015,98(1):203-212.
    [7]Chow Y W,Susilo W,Wong D S.Enhancing thePerceived Visual Quality of a Size Invariant VisualCryptography Scheme[C]//International Confer-ence on Information and Communications Security.Springer Berlin Heidelberg,2012:10-21.
    [8]Fang W P,Wang R Z,Chen S K.Non-expandingFriendly Visual Cryptography[J].Journal of Compu-tational Neuroscience,2014,30(2):225-240.
    [9]Yang C N,Chung T H.Cryptanalysis of Chen et al.A general multi-secret visual cryptography scheme[J].Journal of Photographic Science,2013,61(3):334-340.
    [10]陈春林.基于Android移动终端的二维码识别技术实现与应用研究[D].广州:广东工业大学,2015.
    [11]王骏飞,周廷刚,范敬伟,等.基于二维码和空间数据库的室内定位导航方法研究与实现--以超市导购为例[J].西南大学学报(自然科学版),2014,36(11):209-214.
    [12]Lin P Y,Chen Y H.High payload secret hidingtechnology for QR codes[J].Eurasip Journal onImage&Video Processing,2017,2017(1):14.
    [13]Chow Y W,Susilo W,Man H A,et al.A VisualOne-Time Password Authentication Scheme UsingMobile Devices[C]//International Conference onInformation and Communication Security.2014:243-257.
    [14]Tu T Y,Wang C H.Reversible data hiding withhigh payload based on referred frequency for VQcompressed codes index[J].Signal Processing,2015,108(C):278-287.
    [15]Dey S,Mondal K,Nath J,et al.AdvancedSteganography Algorithm Using RandomizedIntermediate QR Host Embedded With Any Encrypted Secret Message:ASA_QR Algorithm[J].International Journal of Modern Education&Computer Science,2012,4(6):59.
    [16]Honjo S,Koga H.A Secret Sharing Scheme Basedon a Two-Dementional Code with Decodability byMobile Phones[J].IEICE Technical ReportInformation Theory,2012,112(58):35-40.
    [17]Lin P Y.Distributed Secret Sharing Approach WithCheater Prevention Based on QR Code[J].IEEETransactions on Industrial Informatics,2016,12(1):384-392.
    [18]The International Organization for Standardization.ISO/IEC 18004:2015.Information technology-Au-tomatic identification and data capture tech-niques-QR Code bar code symbology specification[S].2015.
    [19]Kenneth R.Castleman.数字图像处理:英文版[M].北京:电子工业出版社,2008.
    [20]杨波.现代密码学[M].3版.北京:清华大学出版社,2015.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700