Perfect secret sharing scheme based on vertex domination set

Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...

Full description

Bibliographic Details
Main Authors: Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A.
Format: Article
Language:English
Published: Taylor and Francis 2015
Online Access:http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
_version_ 1796974577711054848
author Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
author_facet Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
author_sort Al-Saidi, Nadia Mohammed Ghanim
collection UPM
description Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.
first_indexed 2024-03-06T08:59:04Z
format Article
id upm.eprints-45803
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T08:59:04Z
publishDate 2015
publisher Taylor and Francis
record_format dspace
spelling upm.eprints-458032021-05-02T02:08:45Z http://psasir.upm.edu.my/id/eprint/45803/ Perfect secret sharing scheme based on vertex domination set Al-Saidi, Nadia Mohammed Ghanim Rajab, N. A. Md. Said, Mohamad Rushdan Kadhim, K. A. Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme. Taylor and Francis 2015 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf Al-Saidi, Nadia Mohammed Ghanim and Rajab, N. A. and Md. Said, Mohamad Rushdan and Kadhim, K. A. (2015) Perfect secret sharing scheme based on vertex domination set. International Journal of Computer Mathematics, 92 (9). pp. 1755-1763. ISSN 0020-7160; ESSN: 1029-0265 https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20 10.1080/00207160.2014.941360
spellingShingle Al-Saidi, Nadia Mohammed Ghanim
Rajab, N. A.
Md. Said, Mohamad Rushdan
Kadhim, K. A.
Perfect secret sharing scheme based on vertex domination set
title Perfect secret sharing scheme based on vertex domination set
title_full Perfect secret sharing scheme based on vertex domination set
title_fullStr Perfect secret sharing scheme based on vertex domination set
title_full_unstemmed Perfect secret sharing scheme based on vertex domination set
title_short Perfect secret sharing scheme based on vertex domination set
title_sort perfect secret sharing scheme based on vertex domination set
url http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
work_keys_str_mv AT alsaidinadiamohammedghanim perfectsecretsharingschemebasedonvertexdominationset
AT rajabna perfectsecretsharingschemebasedonvertexdominationset
AT mdsaidmohamadrushdan perfectsecretsharingschemebasedonvertexdominationset
AT kadhimka perfectsecretsharingschemebasedonvertexdominationset