Skip to main content

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts

  • Conference paper
  • First Online:
Cooperative Design, Visualization, and Engineering (CDVE 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10451))

  • 1221 Accesses

Abstract

Information security is an important yet challenging area of education. Much of the difficulty lies in the complexity of security schemes and the often perceived disjoint between theory and practice. This paper investigates the topic of adopting cooperative learning for teaching secret sharing concepts and schemes. The aim of this is to motivate and cultivate an interest in students to learn more about the topic. By designing hands-on cooperative learning activities, the goal is help students appreciate the connection between theory and practice, and to be able to help and encourage each other in their understanding of the area. In this paper, we analyze the suitability of this group-based learning approach in relation to addressing the five essential elements of cooperative learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11–46. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20901-7_2

    Chapter  Google Scholar 

  2. Bhattacharya, P., Yang, L., Guo, M., Qian, K., Yang, M.: Learning mobile security with labware. IEEE Secur. Priv. 12(1), 69–72 (2014)

    Article  Google Scholar 

  3. Bishop, M.: What is computer security? IEEE Secur. Priv. 99(1), 67–69 (2003)

    Article  Google Scholar 

  4. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317 (1979)

    Google Scholar 

  5. Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10–21. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34129-8_2

    Chapter  Google Scholar 

  6. Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409–425. Springer, Cham (2016). doi:10.1007/978-3-319-40253-6_25

    Chapter  Google Scholar 

  7. Decuyper, S., Dochy, F., Van den Bossche, P.: Grasping the dynamic complexity of team learning: an integrative model for effective team learning in organisations. Educ. Res. Rev. 5(2), 111–133 (2010)

    Article  Google Scholar 

  8. Ernits, M., Kikkas, K.: A live virtual simulator for teaching cybersecurity to information technology students. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 474–486. Springer, Cham (2016). doi:10.1007/978-3-319-39483-1_43

    Google Scholar 

  9. Johnson, D.W., Johnson, R.T.: Making cooperative learning work. Theory Pract. 38(2), 67–73 (1999)

    Article  Google Scholar 

  10. Johnson, D.W., Johnson, R.T.: An educational psychology success story: social interdependence theory and cooperative learning. Educ. Res. 38(5), 365–379 (2009)

    Article  Google Scholar 

  11. Kyndt, E., Raes, E., Lismont, B., Timmers, F., Cascallar, E., Dochy, F.: A meta-analysis of the effects of face-to-face cooperative learning. Do recent studies falsify or verify earlier findings? Educ. Res. Rev. 10, 133–149 (2013)

    Article  Google Scholar 

  12. Locasto, M., Sinclair, S.: An experience report on undergraduate cyber-security education and outreach. In: Annual Conference on Education in Information Security (ACEIS) (2009)

    Google Scholar 

  13. Logan, P.Y., Clarkson, A.: Teaching students to hack: curriculum issues in information security. In: ACM SIGCSE Bulletin, vol. 37, pp. 157–161. ACM (2005)

    Google Scholar 

  14. Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419

    Google Scholar 

  15. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  16. Slavin, R.E.: When does cooperative learning increase student achievement? Psychol. Bull. 94(3), 429 (1983)

    Article  Google Scholar 

  17. Terry, C., Castellano, A., Harrod, J., Luke, J., Reichherzer, T.: The UWF cyber battle lab: a hands-on computer lab for teaching and research in cyber security. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2014)

    Google Scholar 

  18. Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology, pp. 179–192. Springer, Cham (2014). doi:10.1007/978-3-319-03656-4_16

    Chapter  Google Scholar 

  19. Xu, L., Huang, D., Tsai, W.-T.: Cloud-based virtual laboratory for network security education. IEEE Trans. Educ. 57(3), 145–150 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the support of the UOW UIC International Links Grant 2017 that was awarded for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang-Wai Chow .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chow, YW., Susilo, W., Yang, G. (2017). Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2017. Lecture Notes in Computer Science(), vol 10451. Springer, Cham. https://doi.org/10.1007/978-3-319-66805-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66805-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66804-8

  • Online ISBN: 978-3-319-66805-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics