{"title":"阈值音频秘密共享方案对音频秘密进行加密","authors":"Tetsuro Ishizuka, Yodai Watanabe","doi":"10.1109/WIFS49906.2020.9360907","DOIUrl":null,"url":null,"abstract":"Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. The aim of this paper is to extend the existing result of ASS schemes encrypting audio secrets to the general threshold case. For this purpose, the decryption function is extended from the sum of shares to the weighted sum of shares. Moreover, the notion of noise tolerance is introduced and used to generalize the existing formulation of ASS schemes. Based on this generalized formulation, a construction of ASS schemes encrypting audio secrets is provided and its security and noise tolerance are examined.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Threshold audio secret sharing schemes encrypting audio secrets\",\"authors\":\"Tetsuro Ishizuka, Yodai Watanabe\",\"doi\":\"10.1109/WIFS49906.2020.9360907\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. The aim of this paper is to extend the existing result of ASS schemes encrypting audio secrets to the general threshold case. For this purpose, the decryption function is extended from the sum of shares to the weighted sum of shares. Moreover, the notion of noise tolerance is introduced and used to generalize the existing formulation of ASS schemes. Based on this generalized formulation, a construction of ASS schemes encrypting audio secrets is provided and its security and noise tolerance are examined.\",\"PeriodicalId\":354881,\"journal\":{\"name\":\"2020 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Workshop on Information Forensics and Security (WIFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIFS49906.2020.9360907\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS49906.2020.9360907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secret sharing is a method of encrypting a secret into multiple pieces called shares so that only qualified sets of shares can be employed to reconstruct the secret. Audio secret sharing (ASS) is an example of secret sharing whose decryption can be performed by human ears. The aim of this paper is to extend the existing result of ASS schemes encrypting audio secrets to the general threshold case. For this purpose, the decryption function is extended from the sum of shares to the weighted sum of shares. Moreover, the notion of noise tolerance is introduced and used to generalize the existing formulation of ASS schemes. Based on this generalized formulation, a construction of ASS schemes encrypting audio secrets is provided and its security and noise tolerance are examined.