{"title":"Multiparty Random Phase Wrapping Secret-Sharing Systems for Visual Data Security","authors":"Youhyun Kim;Ongee Jeong;Inkyu Moon;Bahram Javidi","doi":"10.1109/TSMC.2025.3541827","DOIUrl":null,"url":null,"abstract":"A secret sharing scheme is an important cryptographic procedure that enables the secure distribution of secret information, such as private images, in an untrusted network. However, in all secret sharing schemes, the sizes of the shares increase in proportion to the size of the secret information, because they involve computationally expensive polynomials of degree <inline-formula> <tex-math>$n-1$ </tex-math></inline-formula> (n is total number of shares) and increasingly large modulus of modulo operations for security. Moreover, with large share sizes, it is not easy in practice to encrypt them quickly using block cipher algorithms. Therefore, ensuring the security of secret sharing for large-scale visual data with a reasonable share length and efficiently encrypting n shares properly represents formidable challenges. To overcome these challenges in secret sharing schemes, we propose new multiparty random phase wrapping secret sharing systems for visual datasets. Computational optical imaging enables the acquisition of wrapped phase information, ranging from –<inline-formula> <tex-math>$\\pi $ </tex-math></inline-formula> to <inline-formula> <tex-math>$\\pi $ </tex-math></inline-formula>, to be expressed in the form of a complex sinusoidal waveform. The proposed scheme allows for large-scale secret data—such as confidential digital images and visual data, including optical images—to be securely and efficiently shared and distributed to multiple parties or agencies utilizing a digital representation of a complex sinusoidal waveform of the secret information. The proposed scheme can be useful in cryptographic key escrow systems and in use with large-scale secret data.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 5","pages":"3586-3600"},"PeriodicalIF":8.6000,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Systems Man Cybernetics-Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10925349/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
A secret sharing scheme is an important cryptographic procedure that enables the secure distribution of secret information, such as private images, in an untrusted network. However, in all secret sharing schemes, the sizes of the shares increase in proportion to the size of the secret information, because they involve computationally expensive polynomials of degree $n-1$ (n is total number of shares) and increasingly large modulus of modulo operations for security. Moreover, with large share sizes, it is not easy in practice to encrypt them quickly using block cipher algorithms. Therefore, ensuring the security of secret sharing for large-scale visual data with a reasonable share length and efficiently encrypting n shares properly represents formidable challenges. To overcome these challenges in secret sharing schemes, we propose new multiparty random phase wrapping secret sharing systems for visual datasets. Computational optical imaging enables the acquisition of wrapped phase information, ranging from –$\pi $ to $\pi $ , to be expressed in the form of a complex sinusoidal waveform. The proposed scheme allows for large-scale secret data—such as confidential digital images and visual data, including optical images—to be securely and efficiently shared and distributed to multiple parties or agencies utilizing a digital representation of a complex sinusoidal waveform of the secret information. The proposed scheme can be useful in cryptographic key escrow systems and in use with large-scale secret data.
期刊介绍:
The IEEE Transactions on Systems, Man, and Cybernetics: Systems encompasses the fields of systems engineering, covering issue formulation, analysis, and modeling throughout the systems engineering lifecycle phases. It addresses decision-making, issue interpretation, systems management, processes, and various methods such as optimization, modeling, and simulation in the development and deployment of large systems.