Visual cryptography for general access structures

被引:435
作者
Ateniese, G
Blundo, C
DeSantis, A
Stinson, DR
机构
[1] UNIV SALERNO,DIPARTIMENTO INFORMAT & APPLICAZ,I-84081 BARONISSI,ITALY
[2] UNIV NEBRASKA,DEPT COMP SCI & ENGN,LINCOLN,NE 68588
[3] UNIV NEBRASKA,CTR COMMUN & INFORMAT SCI,LINCOLN,NE 68588
基金
美国国家科学基金会;
关键词
D O I
10.1006/inco.1996.0076
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A visual cryptography scheme for a set P of n participants is a method of encoding a secret image SI into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can ''visually'' recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) on SI. A ''visual'' recovery for a set X subset of or equal to P consists of xeroxing the shares given to the participants in X onto transparencies, and then stacking them. The participants in a qualified set X will be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques for constructing visual cryptography schemes for general access structures. We analyze the structure of Visual cryptography schemes and we prove bounds on the size of the shares distributed to the participants in the scheme. We provide a novel technique for realizing k out of n threshold visual cryptography schemes. Our construction for k out of n visual cryptography schemes is better with respect to pixel expansion than the one proposed by M. Naor and A. Shamir (Visual cryptography, in ''Advances in Cryptology-Eurocrypt '94'' CA. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1 12, Springer-Verlag, Berlin, 1995) and for the case of 2 out of n is the best possible, Finally, we consider graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme. (C) 1996 Academic Press. Inc.
引用
收藏
页码:86 / 106
页数:21
相关论文
共 15 条
[1]  
Ateniese G., 1996, LNCS, V1099, P416
[2]  
ATENIESE G, 1995, EXTENDED SCHEMES VIS
[3]  
ATICI M, IN PRESS J COMBIN DE
[4]  
BLUDNO C, 1995, J CRYPTOL, V8, P39
[5]  
Blundo C., 1996, CONTRAST VISUAL CRYP
[6]  
Brickell E. F., 1992, Journal of Cryptology, V5, P153, DOI 10.1007/BF02451112
[7]   ZERO ERROR CAPACITY UNDER LIST DECODING [J].
ELIAS, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1988, 34 (05) :1070-1074
[8]   FAMILIES OF FINITE SETS IN WHICH NO SET IS COVERED BY THE UNION OF R OTHERS [J].
ERDOS, P ;
FRANKL, P ;
FUREDI, Z .
ISRAEL JOURNAL OF MATHEMATICS, 1985, 51 (1-2) :79-89
[9]  
FREDMAN ML, 1984, SIAM J ALGEBRAIC DIS, V5
[10]  
MEHLHORN K, 1982, P 23 ANN IEEE S FDN, P170