Next Article in Journal
A Novel Multimodal Biometrics Recognition Model Based on Stacked ELM and CCA Methods
Next Article in Special Issue
Deep Learning-Based Image Segmentation for Al-La Alloy Microscopic Images
Previous Article in Journal / Special Issue
Fluid-Solid Boundary Handling Using Pairwise Interaction Model for Non-Newtonian Fluid
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessArticle
Symmetry 2018, 10(4), 95; https://doi.org/10.3390/sym10040095

Cooperative Secret Sharing Using QR Codes and Symmetric Keys

1
Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University ofWollongong,Wollongong, NSW 2522, Australia
2
Centre of Persuasive Technology and Society, School of Computing and Information Technology, University ofWollongong,Wollongong, NSW 2522, Australia
*
Author to whom correspondence should be addressed.
Received: 28 February 2018 / Revised: 30 March 2018 / Accepted: 3 April 2018 / Published: 4 April 2018
(This article belongs to the Special Issue Symmetry in Cooperative Applications III)
View Full-Text   |   Download PDF [358 KB, uploaded 3 May 2018]   |  

Abstract

Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR) codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol. View Full-Text
Keywords: cooperative; Quick Response (QR) code; secret sharing; symmetric key cooperative; Quick Response (QR) code; secret sharing; symmetric key
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Chow, Y.-W.; Susilo, W.; Tonien, J.; Vlahu-Gjorgievska, E.; Yang, G. Cooperative Secret Sharing Using QR Codes and Symmetric Keys. Symmetry 2018, 10, 95.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top