Professional Documents
Culture Documents
n n n x xi
Pn ( x) yk Ln ,k ( x) yk mod p
k 0 k 0 i 0,i k xk xi
Computing Secret Value M
t t
xi
M yk mod p
k 1 i 1, i k x k xi
Simple Exercises from p.303-306
2. You set up a (2,30) Shamir threshold scheme,
working mod the prime 101. Two of the shares
are (1,13) and (3,12). Another person received
the share (2,*), what is the value of *?
Share
Shadow Images Acquisition
• The equation can be written by
g(x)≡a0+a1x+a2x2+…+ak-1xk-1 mod 251
• Select n distinct secret keys x1,x2,…,xn.
• Deliver (xi,s(xi)) to the ith participant.
Get the Permutation Image
Secret Image Reconstruction
• Without loss of generality, we have (x1,s(x
1)),(x2,s(x2)),…, (xk,s(xk)).
Histogram of Lenna
The secret image The permutation image
512 x512
1 k
The probability to get the right image is
251
Property and Conclusion
• P=251
• A lossy method
• The size of each shadow image is 1/r of the secr
et image
• Fault-tolerance
• Use network hard disks for storage.
• Steganography
• …
References
• W. Trappe and l.C. Washington, Introducti
on to Cryptography with Coding Theory, P
earson International Edition (2006)