The security is so important for both storing and transmitting the digital data, the choice of parameters is critical for a security system, that is, a weak parameter will make the scheme very vulnerable to attacks, for example the use of supersingular curves or anomalous curves leads to weaknesses in elliptic curve cryptosystems, for RSA cryptosystem there are some attacks for low public exponent or small private exponent. In certain circumstances the secret sharing scheme is required to decentralize the risk. In the context of the security of secret sharing schemes, it is known that for the scheme of Shamir, an unqualified set of shares cannot leak any information about the secret. This paper aims to show that the well-known Shamir’s secret sharing is not always perfect and that the uniform randomization before sharing is insufficient to obtain a secure scheme. The second purpose of this paper is to give an explicit construction of weak polynomials for which the Shamir’s (k, n) threshold scheme is insecure in the sense that there exist a fewer than k shares which can reconstruct the secret. Particular attention is given to the scheme whose threshold is less than or equal to 6. It also showed that for certain threshold k, the secret can be calculated by a pair of shares with the probability of 1/2. Finally, in order to address the mentioned vulnerabilities, several classes of polynomials should be avoided.
Publications Internationales
Security limitations of Shamir’s secret sharing. Journal of Discrete Mathematical Sciences and Cryptography [Internet]. 2022 :1-13. Publisher's VersionAbstract
.
A Novel Image Encryption Approach Using Polar Decomposition and Orthogonal Matrices. Malaysian Journal of Computing and Applied Mathematics [Internet]. 2020;3 (1) :27-34. Publisher's VersionAbstract
.
New chaotic cryptosystem for the image encryption. International Journal of Information and Computer Security [Internet]. 2020;12 (4) :450-463. Publisher's VersionAbstract
.
A lossless image encryption algorithm using matrix transformations and XOR operation. International Journal of Information and Communication Technology. 2018;13 (1).Abstract
.
A new steganography algorithm using polar decomposition. Information Security Journal: A Global Perspective . 2018;27 (3) :133-144.Abstract
.
A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal Processing. 2018;30 :pages1093–1112.Abstract
.
ON CERTAIN INVARIANTS OF TRIVECTORS. Communications in Applied Analysis. 2017;21 (4) :595-606.Abstract
.
ON CERTAIN INVARIANTS OF TRIVECTORS. Communications in Applied Analysis. 2017;21 (4) :595-606.Abstract
.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication Technology. 2017;10 (4).Abstract
.
A ROBUST BLIND AND SECURE WATERMARKING SCHEME USING POSITIVE SEMI DEFINITE MATRICES. International Journal of Computer Science & Information Technology (IJCSIT) . 2014;6 (5).Abstract
.