Perfect secret sharing scheme based on vertex domination set

Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A.
Format: Article
Language:en
Published: Taylor and Francis 2015
Online Access:http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
http://psasir.upm.edu.my/id/eprint/45803/
https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.