Perfect secret sharing scheme based on vertex domination set

Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A.
Format: Article
Language:English
Published: Taylor and Francis 2015
Online Access:http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
http://psasir.upm.edu.my/id/eprint/45803/
https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.45803
record_format eprints
spelling my.upm.eprints.458032021-05-02T02:08:45Z http://psasir.upm.edu.my/id/eprint/45803/ Perfect secret sharing scheme based on vertex domination set Al-Saidi, Nadia Mohammed Ghanim Rajab, N. A. Md. Said, Mohamad Rushdan Kadhim, K. A. Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme. Taylor and Francis 2015 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf Al-Saidi, Nadia Mohammed Ghanim and Rajab, N. A. and Md. Said, Mohamad Rushdan and Kadhim, K. A. (2015) Perfect secret sharing scheme based on vertex domination set. International Journal of Computer Mathematics, 92 (9). pp. 1755-1763. ISSN 0020-7160; ESSN: 1029-0265 https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20 10.1080/00207160.2014.941360
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.
format Article
author Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
spellingShingle Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
Perfect secret sharing scheme based on vertex domination set
author_facet Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
author_sort Al-Saidi, Nadia Mohammed Ghanim
title Perfect secret sharing scheme based on vertex domination set
title_short Perfect secret sharing scheme based on vertex domination set
title_full Perfect secret sharing scheme based on vertex domination set
title_fullStr Perfect secret sharing scheme based on vertex domination set
title_full_unstemmed Perfect secret sharing scheme based on vertex domination set
title_sort perfect secret sharing scheme based on vertex domination set
publisher Taylor and Francis
publishDate 2015
url http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
http://psasir.upm.edu.my/id/eprint/45803/
https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20
_version_ 1699238808630853632
score 13.18916