The use of mathematical linguistic methods in creating secret sharing threshold algorithms

Further examples of the use of new secret splitting procedures are applications related to exchanging and managing multimedia content. This is because it turns out that such content can, to a great extent, carry confidential data or contain important information on, for example, the copyright for a given work in a digital format. All of this means that issues concerning the intelligent watermarking of digital data and conveying the copyright to the data are becoming relevant. This is because of we want only selected groups of authorised users to have the rights to recreate split secrets or information significant from the point of view of the authorisation or the access to strategic or multimedia data.

The need to create new algorithmic solutions has led to the development of new algorithms or protocols for the intelligent splitting and management of secret information. This publication presents such a solution which employs already known information sharing techniques  to allow creation of a more generalised protocol which can find wide-ranging uses in the hierarchical management of strategic information or multimedia data. This algorithm will use mathematical linguistics methods to add an extra stage to the secret splitting procedure, allowing the shared data to be coded using suitably defined words of a context-free language introduced. The technique proposed below can play the role of a hierarchical algorithm for secret splitting or can be used as a data sharing and management protocol in hierarchical structures of companies. In terms of the security of the proposed procedure, it can be said to guarantee the complete confidentiality of the created components of the secret . This technique will take advantage of already known algorithms dedicated to secret splitting. The opportunity to introduce a new method of converting the split data using grammar symbols will also be reminiscent of modern solutions originating from DNA cryptography. However, it should be emphasised that in the classical DNA coding approach, a notation in the form of four nitrogen bases (A, T, G, C) used to code bit pairs of the encrypted information is employed. This publication presents a new, generalised algorithm which allows bit blocks of any length to be coded into new sequences represented by the words of a context-free language. This algorithm is used to split the secret and to intelligently manage information in a hierarchical manner.

READ ALSO:  15 Ways of the Successful Self-Directed Learner
Prev2 of 8Next

Leave a Reply

Your email address will not be published. Required fields are marked *