Skip to main content
Top

2014 | OriginalPaper | Chapter

5. Proposition of Sharing Techniques Based on the Mathematical Linguistic Approach

Authors : Marek R. Ogiela, Urszula Ogiela

Published in: Secure Information Management Using Linguistic Threshold Approach

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter presents novel solutions of the secret data sharing algorithm based on the concept of mathematical linguistics, which are used to split and share information in various companies. The essence of the presented approach is a linguistic concept stemming from the theory of formal languages, which concept is used in recording, analysing and interpreting various types of data treated as elements of a certain formal language [1].

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef
2.
go back to reference Chomsky, N. (1957). Syntactic structures. London: Mouton. Chomsky, N. (1957). Syntactic structures. London: Mouton.
3.
go back to reference Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.CrossRef
4.
go back to reference Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.CrossRef
5.
go back to reference Ogiela, M. R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008–2008 International Conference on Security Technology (pp. 125–128), December 13–15, 2008, Hainan Island, Sanya. Ogiela, M. R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008–2008 International Conference on Security Technology (pp. 125–128), December 13–15, 2008, Hainan Island, Sanya.
6.
go back to reference Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island. Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking (Vol. 1, pp. 377–380), December 13–15, 2008, Hainan Island.
7.
go back to reference Ogiela, M. R., & Ogiela, U. (2009). Security of linguistic threshold schemes in multimedia systems. Studies in Computational Intelligence, 226, 13–20. Springer, Berlin/Heidelberg.CrossRef Ogiela, M. R., & Ogiela, U. (2009). Security of linguistic threshold schemes in multimedia systems. Studies in Computational Intelligence, 226, 13–20. Springer, Berlin/Heidelberg.CrossRef
8.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.CrossRef Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.CrossRef
9.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef
10.
go back to reference Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
11.
go back to reference Schneier, B. (2000). Secrets & lies, digital security in a networked world. Indianapolis: Wiley. Schneier, B. (2000). Secrets & lies, digital security in a networked world. Indianapolis: Wiley.
12.
go back to reference Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef
13.
go back to reference Beguin, P., & Cresti, A. (1995). General short computational secret sharing schemes. Lecture Notes in Computer Science, 921, 194–208.CrossRef Beguin, P., & Cresti, A. (1995). General short computational secret sharing schemes. Lecture Notes in Computer Science, 921, 194–208.CrossRef
14.
15.
go back to reference Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.
16.
go back to reference Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science, 4882, 283–292.CrossRef Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science, 4882, 283–292.CrossRef
17.
go back to reference ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.MathSciNetMATHCrossRef
18.
go back to reference Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
19.
go back to reference Karnin, E. D., Greene, J. W., & Hellman, M. E. (1983). On sharing secret systems. IEEE Transactions on Information Theory, 29, 35–41.MathSciNetMATHCrossRef Karnin, E. D., Greene, J. W., & Hellman, M. E. (1983). On sharing secret systems. IEEE Transactions on Information Theory, 29, 35–41.MathSciNetMATHCrossRef
20.
go back to reference Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer. Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.
21.
go back to reference Martin, K. M. (1993). Untrustworthy participants in perfect secret sharing schemes (Cryptography and coding III, pp. 255–264). Oxford: Clarendon. Martin, K. M. (1993). Untrustworthy participants in perfect secret sharing schemes (Cryptography and coding III, pp. 255–264). Oxford: Clarendon.
22.
go back to reference O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill. O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.
23.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef
24.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef
25.
go back to reference Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.CrossRef
26.
go back to reference Reynolds, G. (2009). Information technology for managers. Boston: Course Technology. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
27.
go back to reference Schermerhorn, J. R. (2012). Management. Wiley. Schermerhorn, J. R. (2012). Management. Wiley.
28.
go back to reference Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.MATH
30.
go back to reference Tang, S. (2004). Simple secret sharing and threshold RSA signature sSchemes. Journal of Information and Computational Science, 1, 259–262. Tang, S. (2004). Simple secret sharing and threshold RSA signature sSchemes. Journal of Information and Computational Science, 1, 259–262.
31.
go back to reference Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH
32.
go back to reference Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
33.
go back to reference Zheng, Y., Hardjono, T., & Seberry, J. (1994). Reusing shares in secret sharing schemes. Computer, 37, 199–205. Zheng, Y., Hardjono, T., & Seberry, J. (1994). Reusing shares in secret sharing schemes. Computer, 37, 199–205.
Metadata
Title
Proposition of Sharing Techniques Based on the Mathematical Linguistic Approach
Authors
Marek R. Ogiela
Urszula Ogiela
Copyright Year
2014
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5016-9_5

Premium Partner