一种结合秘密共享和隐写术的秘密通信方法

Peizheng Yan, Kaixi Wang, Xiaozhu Jia
{"title":"一种结合秘密共享和隐写术的秘密通信方法","authors":"Peizheng Yan, Kaixi Wang, Xiaozhu Jia","doi":"10.1109/ICCS56273.2022.9988316","DOIUrl":null,"url":null,"abstract":"In the distributed environment, when all parties carry out the cooperative computing, there are problems of low scalability and privacy leakage. To solve the above problems, this paper proposes a scheme that integrates the secret sharing and distributed steganography. Arnold transform is performed to encrypt the secret before the communication, and this transform can effectively improve the robustness of secret transmission. After a secret is embedded in a cover, the scheme uses random numbers to generate multiple sub-stego-objects, then carries out the distributed storage and communication for these sub-stego-objects. The identity of the sender is verified by the receiver using Schnorr zero-knowledge proof at the local, which reduced interaction between the sender and the receiver, and no more information is not obtained by the receiver except the stego-object. As a result, the receiver does not communicate directly with the sender, which, to some extent, can avoid the attention of the steganography from external attackers. Additionally, this scheme can still work even in the case that some users were disconnected from the system after a stego-object is transmitted. After analyzing how the scheme supports more senders, the correctness of the scheme is also proved in detail.","PeriodicalId":382726,"journal":{"name":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Covert Communication Method Combining Secret Sharing and Steganography\",\"authors\":\"Peizheng Yan, Kaixi Wang, Xiaozhu Jia\",\"doi\":\"10.1109/ICCS56273.2022.9988316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the distributed environment, when all parties carry out the cooperative computing, there are problems of low scalability and privacy leakage. To solve the above problems, this paper proposes a scheme that integrates the secret sharing and distributed steganography. Arnold transform is performed to encrypt the secret before the communication, and this transform can effectively improve the robustness of secret transmission. After a secret is embedded in a cover, the scheme uses random numbers to generate multiple sub-stego-objects, then carries out the distributed storage and communication for these sub-stego-objects. The identity of the sender is verified by the receiver using Schnorr zero-knowledge proof at the local, which reduced interaction between the sender and the receiver, and no more information is not obtained by the receiver except the stego-object. As a result, the receiver does not communicate directly with the sender, which, to some extent, can avoid the attention of the steganography from external attackers. Additionally, this scheme can still work even in the case that some users were disconnected from the system after a stego-object is transmitted. After analyzing how the scheme supports more senders, the correctness of the scheme is also proved in detail.\",\"PeriodicalId\":382726,\"journal\":{\"name\":\"2022 IEEE 2nd International Conference on Computer Systems (ICCS)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 2nd International Conference on Computer Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS56273.2022.9988316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 2nd International Conference on Computer Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS56273.2022.9988316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在分布式环境下,各方进行协同计算时,存在可扩展性低、隐私泄露等问题。为了解决上述问题,本文提出了一种将秘密共享和分布式隐写技术相结合的方案。在通信前对秘密进行阿诺德变换加密,可以有效地提高秘密传输的鲁棒性。该方案将秘密嵌入掩体后,利用随机数生成多个子隐密对象,然后对这些子隐密对象进行分布式存储和通信。发送方的身份由接收方在本地使用Schnorr零知识证明进行验证,减少了发送方和接收方之间的交互,并且接收方除了隐写对象之外没有其他信息无法获取。因此,接收方不直接与发送方通信,这在一定程度上可以避免外部攻击者对隐写术的注意。此外,即使在传输隐写对象后某些用户与系统断开连接的情况下,该方案仍然可以工作。通过分析该方案如何支持更多的发送方,详细证明了该方案的正确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Covert Communication Method Combining Secret Sharing and Steganography
In the distributed environment, when all parties carry out the cooperative computing, there are problems of low scalability and privacy leakage. To solve the above problems, this paper proposes a scheme that integrates the secret sharing and distributed steganography. Arnold transform is performed to encrypt the secret before the communication, and this transform can effectively improve the robustness of secret transmission. After a secret is embedded in a cover, the scheme uses random numbers to generate multiple sub-stego-objects, then carries out the distributed storage and communication for these sub-stego-objects. The identity of the sender is verified by the receiver using Schnorr zero-knowledge proof at the local, which reduced interaction between the sender and the receiver, and no more information is not obtained by the receiver except the stego-object. As a result, the receiver does not communicate directly with the sender, which, to some extent, can avoid the attention of the steganography from external attackers. Additionally, this scheme can still work even in the case that some users were disconnected from the system after a stego-object is transmitted. After analyzing how the scheme supports more senders, the correctness of the scheme is also proved in detail.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信