International Journal of Applied Science and Engineering
Published by Chaoyang University of Technology

Guttikonda Prashanti 1*, P Ashok Kumar 2, Popuri Keerthika 3

 1 Department of Advanced Computer Science and Engineering, Vignan’s Foundation for Science, Technology and Research, Vadlamudi, Guntur, AP, India

2 Department of Chemical Engineering, Vignan’s Foundation for Science, Technology and Research, Vadlamudi, Guntur, AP, India

3 Department of CSE, R.V.R. and J.C., College of Engineering, Chowdavaram, Guntur, AP, India


 

Download Citation: |
Download PDF


ABSTRACT


Polynomial-based secret sharing is a tool used to secure a secret that is being shared by a group of users. Dealer, through a private channel, distributes shadows of the secret to users in the group, and only the threshold number of users with their shadows can retrieve the secret. However, some users provide fake shadows so that the original secret cannot be retrieved. Identifying such cheating behavior is important while reconstructing the secret. This article introduces a novel method for audio-based secret sharing using polynomials. The proposed technique not only enables the creation of smaller-dimensional audio shares but also incorporates a mechanism to identify untrustworthy participants within the group. Our proposed method employs dual security measures to ensure the integrity and authenticity of the audio-sharing process. Firstly, our method includes a verification process to authenticate whether the dealer has indeed derived the audio share using the participant's true secret value. Through this approach, participants can ensure the integrity and authenticity of the audio shares published by the dealer. Secondly, another set of verification codes is generated to enable participants to validate each other's submitted secret values, preventing fraudulent submissions during the reconstruction process. By employing this dual approach, security is enhanced through the implementation of multiple layers of verification and authentication across the entire process.


Keywords: Checksum, Confidentiality, Discrete logarithms, Generator, Lagrange interpolation, Untrustworthy participants.


Share this article with your colleagues

 


REFERENCES


  1. Abbasi, A.T., Miao, F., Islam, M.S. 2024. A secure and robust audio watermarking scheme using secret sharing in the transform-domain. Circuits Syst Signal Process, 44, 1274–1307.

  2. Arup, K.C., Sanchita, S., Amitava, N., Sukumar, N. 2024. Secret sharing: A comprehensive survey, taxonomy and applications. Computer Science Review, 51, 100608.
  3. Alam, I., Alali, A.S., Ali, S., Asri, M.S.M. 2024. A verifiable multi-secret sharing scheme for hierarchical access structure. Axioms, 13, 515.
  4. Bahman, R., Ziba, E. 2019. A verifiable threshold secret sharing scheme based on lattices. Information Sciences, 501, 655–661.

  5. Blakley, G.R. 1979. Safeguarding cryptographic keys. In proceedings of the AFIPS National Computer Conference. IEEE Computer Society, 48, 313–317.

  6. Desmedt, Y.G., Hou, S., Quisquater, J.J. 1998. Audio and optical cryptography. In International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Heidelberg, 1514, 392–404.

  7. Guttikonda, P., Mundukur, N.B. 2020. Polynomial-based secret sharing scheme for text, image and audio. Journal of the Institution of Engineers (India): Series B, 101, 609–621.
  8. Guttikonda, P., Mundukur, N.B. 2024. Cheating identifiable polynomial based secret sharing scheme for audio and image. Multimedia Tools and Applications, 83, 403–423.

  9. Jani, L.A., Anandha, G.S.M., Modigari, N. 2015. DNA based multi-secret image sharing. Procedia Computer Science, 46, 1794–1801.

  10. Jeonghun, C., Sushil, K.S., Tae, W.K., Jong, H.P. 2021. Blockchain-empowered cloud architecture based on secret sharing for smart city. Journal of Information Security and Applications, 57, 102686.
  11. Li, F., Wu, Q., Lin, C., Zhu, S. 2024. A threshold changeable dynamic quantum secret sharing scheme with cheating identification. Quantum Inf Process 23, 358.
  12. Lein, H., Changlu, L. 2010. Strong (n,t,n) verifiable secret sharing scheme. Information Sciences, 180, 3059–3064.
  13. Massoud, H.D., Samaneh, M. 2008. New efficient and practical verifiable multi-secret sharing schemes. Information Sciences, 178, 2262–2274.

  14. Parihar, B., Deshmukh, M., Rawat, A.S. 2024. A framework for counting based secret sharing scheme for images. Multimedia Tools and Applications, 83, 86757–86790.
  15. Parsa, S., Shabir. A.P., Mohiuddin, G.B., Ali, A.H., Khan, M. 2021. Secret sharing-based personal health records management for the internet of health things. Sustainable Cities and Society, 74, 103129.

  16. Prashanti, G., Nirupama, B.M. 2020. Secret sharing with reduced share size and data integrity, Ingénierie des Systèmes d’Information, 25, 227–237.

  17. Shyamalendu, K., Bibhas, C.D. 2020. A verifiable secret sharing scheme with combiner verification and cheater identification. Journal of Information Security and Applications, 51, 102430.
  18. Shamir, A. 1979. How to share a secret. Communications ACM, 22, 612–613.
  19. Shankar, K., Elhoseny, M. 2019. Optimal lightweight encryption based secret share creation scheme for digital images in wireless sensor networks. Secure Image Transmission in Wireless Sensor Network Applications, 564, 115–129.

  20. Thien, C.C., Lin, J.C. 2002. Secret image sharing. Computer Graphics, 26, 765–570.

  21. Verma, O.P., Jain, N., Pal, S.K. 2020. A hybrid-based verifiable secret sharing scheme using chinese remainder theorem. Arabian Journal for Science and Engineering, 45, 2395–2406.

  22. Vyavahare, S., Patil, S. 2016. Analysing secret sharing schemes for audio sharing. International Journal of Computer Applications, 137, 39–42.

  23. Wang, J.N., Wu, T.X., Sun, T.Y. 2015. An audio secret sharing system based on fractal en-coding. In: Proceedings of 49th International Carnahan Conference on Security Technology, 211–216.

  24. Yakubu, M.A., Namunu, C.M., Pradeep, K.A. 2015. Audio secret management scheme using Shamir’s secret sharing. International Conference on Multimedia Modeling, 8935, 396–407.

  25. Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q. 2009. A new image secret sharing scheme to identify cheaters. Computer Standards and Interfaces, 31, 252–257.
  26. Zuquan, L., Guopu, Z., Yu, Z., Hongli, Z., Sam, K. 2024. An efficient cheating-detectable secret image sharing scheme with smaller share sizes. Journal of Information Security and Applications, 81, 103709.


ARTICLE INFORMATION


Received: 2024-07-12
Revised: 2024-12-23
Accepted: 2025-02-16
Available Online: 2025-03-17


Cite this article:

Prashanti, G., P, A.K., Keerthika, P. 2025. Ensuring dealer and participant truthfulness in the audio share generation and reconstruction processes for an audio secret sharing scheme. International Journal of Applied Science and Engineering, 22, 2024232.https://doi.org/10.6703/IJASE.202503_22(1).002

  Copyright The Author(s). This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are cited.