×

A secret sharing scheme based on cellular automata. (English) Zbl 1083.94536

Summary: A new secret sharing scheme based on a particular type of discrete delay dynamical systems: memory cellular automata, is proposed. Specifically, such scheme consists of a \((k,n)\)-threshold scheme where the text to be shared is considered as one of the \(k\) initial conditions of the memory cellular automata and the \(n\) shares to be distributed are \(n\) consecutive configurations of the evolution of such cellular automata. It is also proved to be perfect and ideal.

MSC:

94A62 Authentication, digital signatures and secret sharing
94A60 Cryptography
37B15 Dynamical aspects of cellular automata
68Q80 Cellular automata (computational aspects)
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Yang, Ch.-Ch.; Chang, T.-Y.; Hwang, M.-Sh., A \((t,n)\) multi-secret sharing scheme, Appl. Math. Comput., 151, 483-490 (2004) · Zbl 1045.94018
[2] Shamir, A., How to share a secret, Commun. ACM, 22, 612-613 (1979) · Zbl 0414.94021
[3] Blakley, G. R., Safeguarding cryptographic keys, AFIPS Conf. Proc., 48, 313-317 (1979)
[4] Menezes, A.; van Oorschot, P.; Vanstone, S., Handbook of Applied Cryptography (1997), CRC Press: CRC Press Boca Raton, FL · Zbl 0868.94001
[5] Stinson, D. R., An explication of secret sharing schemes, Des. Codes Cryptogrph., 2, 357-390 (1992) · Zbl 0793.68111
[6] Stinson, D. R., Cryptography Theory and Practice (2002), CRC Press: CRC Press Boca Raton, FL · Zbl 0997.94001
[7] Alonso-Sanz, R.; Martín, M., One-dimensional cellular automata with memory: patterns from a single site seed, Int. J. Bifur. Chaos Appl. Sci. Eng., 12, 205-226 (2002) · Zbl 1044.37007
[8] Alonso-Sanz, R.; Martín, M., Elementary cellular automata with memory, Complex Systems, 14, 99-126 (2003) · Zbl 1167.68384
[9] Wolfram, S., Random sequence generation by cellular automata, Adv. Appl. Math., 7, 123-169 (1986) · Zbl 0603.68053
[10] P.H. Bardell, Analysis of cellular automata used as pseudorandom pattern generators, in: Proceedings of 1990 International Test Conference, 1990, pp. 762-768.; P.H. Bardell, Analysis of cellular automata used as pseudorandom pattern generators, in: Proceedings of 1990 International Test Conference, 1990, pp. 762-768.
[11] Cattell, K.; Muzio, J. C., An explicit similarity transform between cellular automata and LFSR matrices, Finite Fields Appl., 4, 239-251 (1998) · Zbl 0948.94007
[12] Díaz Len, R.; Hernández Encinas, A.; Hernández Encinas, L.; Hoya White, S.; Martín del Rey, A.; Rodríguez Sánchez, G.; Visus Ruíz, I., Wolfram cellular automata and their cryptographic use as pseudorandom bit generators, Int. J. Pure Appl. Math., 4, 87-103 (2003) · Zbl 1036.94007
[13] Fraile Rubio, C.; Hernández Encinas, L.; Hoya White, S.; Martín del Rey, A.; Rodríguez Sánchez, G., The use of linear hybrid cellular automata as pseudorandom bit generators in cryptography, Neural, Parallel Sci. Comput., 12, 175-192 (2004) · Zbl 1161.68439
[14] Guan, P., Cellular automaton public-key cryptosystem, Complex Systems, 1, 51-57 (1987) · Zbl 0652.94014
[15] H.A. Gutowitz, Cryptography with dynamical systems, in: Proceedings of the NATO Advanced Study Institute: Cellular Automata and Cooperative Systems 1993, pp. 237-274.; H.A. Gutowitz, Cryptography with dynamical systems, in: Proceedings of the NATO Advanced Study Institute: Cellular Automata and Cooperative Systems 1993, pp. 237-274. · Zbl 0854.94008
[16] Meier, W.; Staffelbach, O., Analysis of pseudorandom sequences generated by cellular automata, Advances in Cryptol.-EUROCRYPT’91, Lect. Notes Comput. Sci., 547, 186-189 (1991) · Zbl 0791.68121
[17] Nandi, S.; Kar, B. K.; Chaudhuri, P. P., Theory and applications of cellular automata in cryptography, IEEE Trans. Comput., 43, 1346-1357 (1994)
[18] Tomassini, M.; Perrenoud, M., Cryptography with cellular automata, Appl. Software Comput., 1, 151-160 (2001)
[19] G. Alvarez Marañón, A. Hernández Encinas, L. Hernández Encinas, A. Martín del Rey, G. Rodríguez Sánchez, Graphics cryptography with pseudorandom bit generators and cellular automata, in: Proceedings of 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lect. Notes Artif. Intell., 2773, 2003, pp. 1207-1214.; G. Alvarez Marañón, A. Hernández Encinas, L. Hernández Encinas, A. Martín del Rey, G. Rodríguez Sánchez, Graphics cryptography with pseudorandom bit generators and cellular automata, in: Proceedings of 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Lect. Notes Artif. Intell., 2773, 2003, pp. 1207-1214.
[20] L. Hernández Encinas, A. Martín del Rey, A. Hernández Encinas, Encryption of images with two-dimensional cellular automata, in: Proceedings of Sixth Multiconference on Systemics, Cybern. Infor., 2002, pp. 471-476.; L. Hernández Encinas, A. Martín del Rey, A. Hernández Encinas, Encryption of images with two-dimensional cellular automata, in: Proceedings of Sixth Multiconference on Systemics, Cybern. Infor., 2002, pp. 471-476.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.