期刊文献+

Cheater identifiable visual secret sharing scheme 被引量:1

Cheater identifiable visual secret sharing scheme
下载PDF
导出
摘要 The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced. The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期233-236,共4页 系统工程与电子技术(英文版)
基金 ThisprojectwassupportedbyNational"863"HiTechResearchandDevelopmentProgramofChina(2001AA144060)andkeyprogramofNSFC(90104005).
关键词 visual cryptography secret sharing VSS. visual cryptography, secret sharing, VSS.
  • 相关文献

参考文献10

  • 1Shamir A. How to share a secret, commun. ACM, 1979,22(11). 612-613. 被引量:1
  • 2Naor M, Shamir A. Visual cryptography. Advances in Cryptology-EUROCRYPT'94, LNCS 950, 1994, 112. 被引量:1
  • 3Koga H, Yamarmto H. Propzsal d a lattice-based visual secret sharing scheme for color and gray-scale image. IEICE Trans. Fundamentals, 1998, E81-A(6): 1262-1269. 被引量:1
  • 4Giueppe Ateniese, Carlo Blundo, Alfredo De Santis, et al.Visual cryptography for general access structures. Electronic Colloquium on computational Complexitly (ECCC),1996,3(012). 被引量:1
  • 5Carlo Blundo, De Santis Alfredo, Stinson Douglas R. On the contrast in visual cryptography schemes. Journal of Cryptology: The Journal of the International Association for Cryptologic Resenrch, 1999, 12(4):261-289. 被引量:1
  • 6Giuseppe Ateniese, Carlo Blundo, De Santis Alfredo, et al. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2): 143-161, 2001. 被引量:1
  • 7Capocelli R M, Santis Gargano L, et al. On the size of shares for secret sharing schemes. Journal of Cryptology:The Journal of The International Association for Cryptologic Research, 1993, 6(3): 157-167. 被引量:1
  • 8Ryo Ito, Hidenori Kuwakdo, Hatsukazu. Image size invariant visual cryptography. IEICE Trans. Fundamentals,1998, E81-A(10) :2172-2177. 被引量:1
  • 9Blundo, Stinson. Anonymous secret sharing schemes.DMATH: Discrete Applied Mathematics and Combinatorial Operations Research and Computer Science, 77, 1997. 被引量:1
  • 10Moni Naor, Benny Pinkas. Visual authentication and identification. Lecture Notes in Computer Science, 1997,1294: 322. 被引量:1

同被引文献20

  • 1YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 2NAOR M, SHAMIR A. Visual cryptography [ C ] //Proceedings of Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science 950. Berlin: Springer-Verlag, 1995: 1-12. 被引量:1
  • 3LUKAC R, PLATANIOTIS K N, SMOLKA B, et al. A new approach to color image secret sharing[ C]//Proceedilags of the 12th European Signal Processing Conference. Vienna: [ s. n], 2004:1493-1496. 被引量:1
  • 4CIMATO S, PRISCO R D, SANTIS A D. Colored visual cryptography without color darkening [ J ]. Theoretical Computer Science, 2007, 374(1-3): 261-276. 被引量:1
  • 5MacPHERSON L A. Grey level visual cryptography for general access structures [ D ]. Waterloo: University of Waterloo, 2003. 被引量:1
  • 6HU C M, TZENG W G. Cheating prevention in visual cryptography[ J]. IEEE Trans. on Image Processing, 2007, 16( 1 ) : 36-45. 被引量:1
  • 7DENG Y P, GUO L F, LIU M L. Constructions for anonymous secret sharing schemes using combinatorial designs[ J ]. Acta Mathematicae Applicatae Sinica, English Series, 2007, 23 ( 1 ) : 67-78. 被引量:1
  • 8TSAI P F, WANG M S. An (3,3)-visual secret sharing scheme for hiding three secret data[ C/OL]. http: //www, atlantis- press, com/php/download_paper, php? id = 35. 被引量:1
  • 9SHYU S J, HUANG S Y, LEE Y K, et al. Sharing multiple secrets in visual cryptography[ J ]. Pattern Recognition, 2007, 40 : 3633-3651. 被引量:1
  • 10YANG C N, WANG C C, CHEN T S. Real perfect contrast visual secret sharing schemes with reversing [ C ]///Lecture Notes in Computer Science 3989. Berlin: Springer-Verlag, 2006: 433-447. 被引量:1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部