{"title":"音频密码学中的一般访问结构","authors":"D. Socek, S. Magliveras","doi":"10.1109/EIT.2005.1627018","DOIUrl":null,"url":null,"abstract":"We propose and analyze a new type of cryptographic scheme, which extends principles of secret sharing to Morse code-like audio signals. The proposed \"audio cryptography scheme\" (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. \"Audio sharing schemes\" (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed. Our scheme correlates strongly, and is analogous to schemes in well-studied visual cryptography. Consequently, we were able to use the existing visual cryptography constructions and obtain not only k-out-of-n audio sharing schemes, but also the most general audio cryptography schemes for qualified subsets. In audio cryptography scheme for qualified subsets, a subset of participants can recover the secret audio signal only if some qualified subset of participants is its subset","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"General access structures in audio cryptography\",\"authors\":\"D. Socek, S. Magliveras\",\"doi\":\"10.1109/EIT.2005.1627018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose and analyze a new type of cryptographic scheme, which extends principles of secret sharing to Morse code-like audio signals. The proposed \\\"audio cryptography scheme\\\" (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. \\\"Audio sharing schemes\\\" (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed. Our scheme correlates strongly, and is analogous to schemes in well-studied visual cryptography. Consequently, we were able to use the existing visual cryptography constructions and obtain not only k-out-of-n audio sharing schemes, but also the most general audio cryptography schemes for qualified subsets. In audio cryptography scheme for qualified subsets, a subset of participants can recover the secret audio signal only if some qualified subset of participants is its subset\",\"PeriodicalId\":358002,\"journal\":{\"name\":\"2005 IEEE International Conference on Electro Information Technology\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 IEEE International Conference on Electro Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT.2005.1627018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Electro Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2005.1627018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We propose and analyze a new type of cryptographic scheme, which extends principles of secret sharing to Morse code-like audio signals. The proposed "audio cryptography scheme" (ACS) is perfectly secure and easy to implement. It relies on the human auditory system for decoding. "Audio sharing schemes" (ASS) proposed earlier were based on disguising secret binary message with a cover sound. Moreover, only 2-out-of-n audio sharing schemes have ever been proposed. Our scheme correlates strongly, and is analogous to schemes in well-studied visual cryptography. Consequently, we were able to use the existing visual cryptography constructions and obtain not only k-out-of-n audio sharing schemes, but also the most general audio cryptography schemes for qualified subsets. In audio cryptography scheme for qualified subsets, a subset of participants can recover the secret audio signal only if some qualified subset of participants is its subset