Vol.3, No.2, 2021, pp.85-95, doi:10.32604/jbd.2021.018618
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code
  • Xinwei Zhong*, Lizhi Xiong, Zhihua Xia
Nanjing University of Information Science & Technology, Nanjing, 210044, China
* Corresponding Author: Xinwei Zhong. Email:
Received 14 March 2021; Accepted 01 April 2021; Issue published 13 April 2021
With the rise of the Internet of Things (IoT), various devices in life and industry are closely linked. Because of its high payload, stable error correction capability, and convenience in reading and writing, Quick Response (QR) code has been widely researched in IoT. However, the security of privacy data in IoT is also a very important issue. At the same time, because IoT is developing towards low-power devices in order to be applied to more fields, the technology protecting the security of private needs to have the characteristics of low computational complexity. Visual Secret Sharing (VSS), with its features of safety and low computational cost, can fully meet the requirements of communication security in IoT. Therefore, a VSS scheme with QR code (VSS-QR) was proposed and has been applied to some extent. In VSS-QR, the secret is shared into a series of shares. These shares are usually common QR codes, which cannot cause the attention of the attacker. However, if there is dishonesty among participants, the secret cannot be recovered, which will lead to VSS-QR cannot be widely used due to its inadequate security. In this paper, we propose a visual secret sharing scheme with authentication based on QR code (VSSA-QR). Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers. The abovementioned operations conveniently are performed on low-power QR scanning devices. Not only does the proposed scheme prevent some dishonest participants or attackers from cheating, but also prevent all participants from conspiring. In addition, the payload is the QR code itself, which is higher than other schemes. Theoretical analysis and experiments prove that the proposed scheme is effective.
QR code; visual secret sharing; low computational complexity; authentication
Cite This Article
. , "A secure visual secret sharing scheme with authentication based on qr code," Journal on Big Data, vol. 3, no.2, pp. 85–95, 2021.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.