Sharing Secrets by Computing Preimages of Bipermutive Cellular Automata

  • Luca Mariot
  • Alberto Leporati
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8751)


A secret sharing scheme based on one-dimensional bipermutive cellular automata is discussed in this paper. The underlying idea is to represent the secret as a configuration of a bipermutive CA and to iteratively apply a preimage computation algorithm until a sufficiently long configuration to be splitted among the participants is obtained. The scheme is proved to be both perfect and ideal, and a simple extension is shown to induce a sequential access structure which eventually becomes cyclic, where the upper bound on the length of the cycles depends on the radius of the adopted local rule.


Cellular automata cryptography secret sharing schemes bipermutivity preimage computation cyclic access structure 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317. AFIPS Press, Monval (1979)Google Scholar
  2. 2.
    del Rey, Á.M., Mateus, J.P., Sánchez, G.R.: A secret sharing scheme based on cellular automata. Appl. Math. Comput. 170(2), 1356–1364 (2005)CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    Eslami, Z., Ahmadabadi, J.Z.: A verifiable multi-secret sharing scheme based on cellular automata. Inf. Sci. 180(15), 2889–2894 (2010)CrossRefzbMATHGoogle Scholar
  4. 4.
    Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recogn. 43(1), 397–404 (2010)CrossRefzbMATHGoogle Scholar
  5. 5.
    Gutowitz, H.: Cryptography with dynamical systems. In: Goles, E., Boccara, N. (eds.) Cellular Automata and Cooperative Phenomena, pp. 237–274. Kluwer Academic Press (1993)Google Scholar
  6. 6.
    Marañón, G.Á., Encinas, L.H., del Rey, Á.M.: A multisecret sharing scheme for color images based on cellular automata. Inf. Sci. 178(22), 4382–4395 (2008)CrossRefGoogle Scholar
  7. 7.
    Oliveira, G., Coelho, A., Monteiro, L.: Cellular automata cryptographic model based on bi-directional toggle rules. Int. J. Mod. Phys. C 15(8), 1061–1068 (2004)CrossRefzbMATHGoogle Scholar
  8. 8.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    Stinson, D.R.: Cryptography: theory and practice, 3rd edn. CRC Press, Boca Raton (2006)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Luca Mariot
    • 1
  • Alberto Leporati
    • 1
  1. 1.Dipartimento di Informatica, Sistemistica e ComunicazioneUniversità degli Studi Milano, BicoccaMilanoItaly

Personalised recommendations