Skip to main content
Top
Published in: The Journal of Supercomputing 4/2016

01-04-2016

A GPU implementation of secret sharing scheme based on cellular automata

Authors: Rogelio Adrian Hernandez-Becerril, Ariana Guadalupe Bucio-Ramirez, Mariko Nakano-Miyatake, Hector Perez-Meana, Marco Pedro Ramirez-Tachiquin

Published in: The Journal of Supercomputing | Issue 4/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secret sharing (SS) schemes based on cellular automata (CA) are considered as secure encrypting algorithms, where several secret data can be shared among some persons. Recently the SS schemes can be applied to solve real-world problems, such as security in cloud computing. The principal obstacle of use of the SS scheme is its considerably high computational cost; especially if a large amount of secret data must be encrypted and shared. In this work, we propose a parallel CA-based SS scheme suitable for any kinds of digital data in the graphic processing unit using compute unified device architecture technology. The uses of global memory and shared memory are analyzed from computational effectiveness and security points of view. The experimental results show the proposed parallel implementation provides a speedup rate more than 18-fold compared with its sequential implementation. Also we show the increase of the security level of the parallel implementation with respect to the sequential implementation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alvarado R, Tapia J, Rolon J (2014) Medical image segmentation with deformable models on graphics processing units. J Supercomput 68(1):339–364CrossRef Alvarado R, Tapia J, Rolon J (2014) Medical image segmentation with deformable models on graphics processing units. J Supercomput 68(1):339–364CrossRef
2.
go back to reference Alvarez G, Encinas LH, Martn del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395 Alvarez G, Encinas LH, Martn del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178:4382–4395
3.
go back to reference Agosta G, Barenghi A, De Santis F, Pelosi G (2014) Record setting software implementation of DES using CUDA. In: Proceeding of International conference on information technology, pp 748–755 Agosta G, Barenghi A, De Santis F, Pelosi G (2014) Record setting software implementation of DES using CUDA. In: Proceeding of International conference on information technology, pp 748–755
4.
go back to reference Blakley G (1979) Safeguarding cryptographic keys, National Conference on AFIPS Blakley G (1979) Safeguarding cryptographic keys, National Conference on AFIPS
5.
go back to reference Blecic I, Cecchini A, Trunfio GA (2013) Cellular automata simulation of urban dynamics through GPGPU. J Supercomput 65:614–629CrossRef Blecic I, Cecchini A, Trunfio GA (2013) Cellular automata simulation of urban dynamics through GPGPU. J Supercomput 65:614–629CrossRef
6.
go back to reference Campos RS, Lobosco M, Dos Santos RW (2014) A GPU-based heart simulator with mass-spring systems and cellular automaton. J Supercomput 69:1–8CrossRef Campos RS, Lobosco M, Dos Santos RW (2014) A GPU-based heart simulator with mass-spring systems and cellular automaton. J Supercomput 69:1–8CrossRef
7.
go back to reference Cano A, Olmo JL, Ventura S (2013) Parallel multi-objective ant programming for classification. J Parallel Distrib Comput 73:713–728CrossRef Cano A, Olmo JL, Ventura S (2013) Parallel multi-objective ant programming for classification. J Parallel Distrib Comput 73:713–728CrossRef
8.
go back to reference Cesnovar R, Risojevic V, Babic Z, Dobravec T, Bulic P (2013) A GPU implementation of a structural-similarity-based aerial-image classification. J Supercomput 65:978–996CrossRef Cesnovar R, Risojevic V, Babic Z, Dobravec T, Bulic P (2013) A GPU implementation of a structural-similarity-based aerial-image classification. J Supercomput 65:978–996CrossRef
9.
go back to reference Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41:3130–3137CrossRefMATH Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41:3130–3137CrossRefMATH
10.
go back to reference Delignnidis L, Arabria HR (2014) Parallel video processing techniques for surveillance applications. In: Proceeding of international conference on computational science and computational intelligence, pp 183–189 Delignnidis L, Arabria HR (2014) Parallel video processing techniques for surveillance applications. In: Proceeding of international conference on computational science and computational intelligence, pp 183–189
11.
go back to reference Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on Compute Unified Devoce Architecture. In: Proceeding of International conference on grid and cloud computing, pp 174–178 Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on Compute Unified Devoce Architecture. In: Proceeding of International conference on grid and cloud computing, pp 174–178
12.
go back to reference Ferreiro AM, Garcia JA, Lopez-Salas JG, Vazquez C (2013) An Efficient implementation of parallel simulated annealing algorithm in GPUs. J Glob Optim 57:863–890MathSciNetCrossRefMATH Ferreiro AM, Garcia JA, Lopez-Salas JG, Vazquez C (2013) An Efficient implementation of parallel simulated annealing algorithm in GPUs. J Glob Optim 57:863–890MathSciNetCrossRefMATH
13.
go back to reference FIPS 140-2 (2001) Security requierments for cryptographic modules, Federal Information Processing Standard Publication 140-1, US department of Commerce/National Institute of Standards and Technology, pp 1–61. http://www.nist.gov/cmvp FIPS 140-2 (2001) Security requierments for cryptographic modules, Federal Information Processing Standard Publication 140-1, US department of Commerce/National Institute of Standards and Technology, pp 1–61. http://​www.​nist.​gov/​cmvp
14.
go back to reference Ganguly N, Maji P, Sikdar BK, Chaudhuri PP (2004) Design and characterization of cellular automata based associative memory for pattern recognition. IEEE Trans Syst Man Cybern 34(1):672–679CrossRef Ganguly N, Maji P, Sikdar BK, Chaudhuri PP (2004) Design and characterization of cellular automata based associative memory for pattern recognition. IEEE Trans Syst Man Cybern 34(1):672–679CrossRef
15.
go back to reference Jian L, Wang C, Liu Ying, Liang S, Yi Weidong, Si Y (2013) Parallel data mining techniques on Graphics processing unit with compute unified device architecture (CUDA). J Supercomput 64:942–967CrossRef Jian L, Wang C, Liu Ying, Liang S, Yi Weidong, Si Y (2013) Parallel data mining techniques on Graphics processing unit with compute unified device architecture (CUDA). J Supercomput 64:942–967CrossRef
16.
go back to reference Jin J, Wu ZH (2012) A secret image sharing based on neighborhood configurations of \(2-\)D cellular automata. Optics Laser Technol 44:538–548CrossRef Jin J, Wu ZH (2012) A secret image sharing based on neighborhood configurations of \(2-\)D cellular automata. Optics Laser Technol 44:538–548CrossRef
17.
go back to reference Jo H, Hong ST, Chang JW, Choi DH (2014) Offloading data encryption to GPU in database systems. J Supercomput 69:375–394CrossRef Jo H, Hong ST, Chang JW, Choi DH (2014) Offloading data encryption to GPU in database systems. J Supercomput 69:375–394CrossRef
18.
go back to reference Lastra M, Carabao J, Gutierrez PD, Benitez JM, Herrera F (2015) Fast fingerprint identification using GPUs. Inf Sci 301:195–214CrossRef Lastra M, Carabao J, Gutierrez PD, Benitez JM, Herrera F (2015) Fast fingerprint identification using GPUs. Inf Sci 301:195–214CrossRef
19.
go back to reference Lin CC, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414CrossRef Lin CC, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414CrossRef
21.
go back to reference Moore G (1975) Progress in digital integrated electronics. Proc Int Conf IEEE Electr Devices Meet 21:11–13 Moore G (1975) Progress in digital integrated electronics. Proc Int Conf IEEE Electr Devices Meet 21:11–13
22.
go back to reference Mora Juan Carlos Seck Tuoh (2002) Matrix methods and local properties of reversible one-dimensional cellular automata. J Phys A Math Gen 35(27):5563MathSciNetCrossRefMATH Mora Juan Carlos Seck Tuoh (2002) Matrix methods and local properties of reversible one-dimensional cellular automata. J Phys A Math Gen 35(27):5563MathSciNetCrossRefMATH
23.
go back to reference Mora Juan Carlos Seck Tuoh et al (2005) Procedures for calculating reversible one-dimensional cellular automata. Phys D Non-linear Phenom 202(1):134–141MathSciNetCrossRefMATH Mora Juan Carlos Seck Tuoh et al (2005) Procedures for calculating reversible one-dimensional cellular automata. Phys D Non-linear Phenom 202(1):134–141MathSciNetCrossRefMATH
24.
go back to reference Ping P, Xu Feng, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429CrossRef Ping P, Xu Feng, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429CrossRef
25.
go back to reference Quesada P, Heras DB, Argello F (2012) Efficient GPU asynchronous implementation of a Watershed algorithm based on cellular automata. In: Proceeding of IEEE international symposium on parallel and distributed processing with applications, pp 79–86 Quesada P, Heras DB, Argello F (2012) Efficient GPU asynchronous implementation of a Watershed algorithm based on cellular automata. In: Proceeding of IEEE international symposium on parallel and distributed processing with applications, pp 79–86
26.
go back to reference Rosin PL (2006) Training cellular automata for image processing. IEEE Trans Image Process 15(7):2076–2087CrossRef Rosin PL (2006) Training cellular automata for image processing. IEEE Trans Image Process 15(7):2076–2087CrossRef
27.
go back to reference Rukhin A, Soto J, Nechvatal J, Miles S, Barker E, Leigh S, Levenson M, Van gel M, Banks D, Heckert A, Dray J, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22 Revision 1a Rukhin A, Soto J, Nechvatal J, Miles S, Barker E, Leigh S, Levenson M, Van gel M, Banks D, Heckert A, Dray J, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22 Revision 1a
29.
go back to reference Song Z, Chen Z, Shi R (2015) Fast MAP-based super-resolution image reconstruction on GPU-CUDA. Commun Comput Inf Sci 482:170–178CrossRef Song Z, Chen Z, Shi R (2015) Fast MAP-based super-resolution image reconstruction on GPU-CUDA. Commun Comput Inf Sci 482:170–178CrossRef
30.
go back to reference Thorpe C, Li F, Li Z, Yu Z, Sauders D, Yu J (2013) A coprime blur scheme for data security in video surveillance. IEEE Trans Pattern Anal Mach Intell 35(12):3066–3072CrossRef Thorpe C, Li F, Li Z, Yu Z, Sauders D, Yu J (2013) A coprime blur scheme for data security in video surveillance. IEEE Trans Pattern Anal Mach Intell 35(12):3066–3072CrossRef
Metadata
Title
A GPU implementation of secret sharing scheme based on cellular automata
Authors
Rogelio Adrian Hernandez-Becerril
Ariana Guadalupe Bucio-Ramirez
Mariko Nakano-Miyatake
Hector Perez-Meana
Marco Pedro Ramirez-Tachiquin
Publication date
01-04-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 4/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1646-6

Other articles of this Issue 4/2016

The Journal of Supercomputing 4/2016 Go to the issue

Premium Partner