Open Access
ARTICLE
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code
Xinwei Zhong*, Lizhi Xiong, Zhihua Xia
Nanjing University of Information Science & Technology, Nanjing, 210044, China
* Corresponding Author: Xinwei Zhong. Email:
Journal on Big Data 2021, 3(2), 85-95. https://doi.org/10.32604/jbd.2021.018618
Received 14 March 2021; Accepted 01 April 2021; Issue published 13 April 2021
Abstract
With the rise of the Internet of Things (IoT), various devices in life and
industry are closely linked. Because of its high payload, stable error correction
capability, and convenience in reading and writing, Quick Response (QR) code
has been widely researched in IoT. However, the security of privacy data in IoT is
also a very important issue. At the same time, because IoT is developing towards
low-power devices in order to be applied to more fields, the technology protecting
the security of private needs to have the characteristics of low computational
complexity. Visual Secret Sharing (VSS), with its features of safety and low
computational cost, can fully meet the requirements of communication security in
IoT. Therefore, a VSS scheme with QR code (VSS-QR) was proposed and has
been applied to some extent. In VSS-QR, the secret is shared into a series of shares.
These shares are usually common QR codes, which cannot cause the attention of
the attacker. However, if there is dishonesty among participants, the secret cannot
be recovered, which will lead to VSS-QR cannot be widely used due to its
inadequate security. In this paper, we propose a visual secret sharing scheme with
authentication based on QR code (VSSA-QR). Both the reconstructed secret QR
code and shares can be verified whether they are forged by attackers. The abovementioned operations conveniently are performed on low-power QR scanning
devices. Not only does the proposed scheme prevent some dishonest participants
or attackers from cheating, but also prevent all participants from conspiring. In
addition, the payload is the QR code itself, which is higher than other schemes.
Theoretical analysis and experiments prove that the proposed scheme is effective.
Keywords
Cite This Article
X. Zhong, L. Xiong and Z. Xia, "A secure visual secret sharing scheme with authentication based on qr code,"
Journal on Big Data, vol. 3, no.2, pp. 85–95, 2021. https://doi.org/10.32604/jbd.2021.018618