Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Secret sharing scheme based on spread spectrum ghost imaging

Not Accessible

Your library or personal account may give you access

Abstract

$(n,n)$ secret sharing is a procedure for splitting the key into several pieces so that no subset is sufficient to read the encrypted message except the entire one. In this paper, we propose a novel, to the best of our knowledge, secret sharing scheme based on spread spectrum ghost imaging (SSGI). In the scheme, a dealer divides a secret key, which is obtained by a modulo 2 addition over $n$ sequences from a Hadamard matrix, into $n$ pieces to $n$ participants, and then the dealer uses the secret key as a direct sequence code to encrypt an image using the SSGI method. The resultant bucket signal, as the ciphertext, is then shared with $n$ participants, and the modulated speckle patterns in SSGI are also transmitted to $n$ participants by private channels for preventing eavesdropping. An independent signal is used as a protective signal to prevent the information leakage in SSGI. In the decryption process, only if all participants are honest and cooperative, the secret key can be obtained; thus, the ciphertext can be decrypted to the correct image using the second-order correlation algorithm. Otherwise, the image information cannot be extracted. The theoretical analysis shows that the probability of finding out others’ pieces for successfully reconstructing the image for one dishonest participant is ${({1/{2^N}})^{n - 1}}$, where $N$ is the length of the secret key, and $n$ is the number of participants. The simulation and experimental results demonstrate that the proposed scheme has a stronger data security capacity in optical information encryption.

© 2022 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Threshold secret sharing scheme based on phase-shifting interferometry

Xiaopeng Deng, Zhengang Shi, and Wei Wen
Appl. Opt. 55(31) 8855-8859 (2016)

Optical cryptosystem based on computational ghost imaging and nonlinear authentication

Lin Zhang, Xiaogang Wang, Qingming Zhou, Jidong Xue, and Bijun Xu
Opt. Express 32(3) 4242-4253 (2024)

Information encryption based on the customized data container under the framework of computational ghost imaging

Sui Liansheng, Du Cong, Xu Minjie, Tian Ailing, and Asundi Anand
Opt. Express 27(12) 16493-16506 (2019)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (7)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.