首页> 外文会议>Interntaional Workshop on Digital-Forensics and Watermarking >On the Robustness of Visual Cryptographic Schemes
【24h】

On the Robustness of Visual Cryptographic Schemes

机译:关于视觉加密方案的鲁棒性

获取原文

摘要

In this paper, we consider the robustness of a special type of secret sharing scheme known as visual cryptographic scheme in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. Initially, secret sharing schemes were considered with the presumption that the corrupted participants involved in a protocol behave in a passive manner and submit correct shares during the reconstruction of secret. However, that may not be the case in practical situations. A minimal robust requirement, when a fraction of participants behave maliciously and submit incorrect shares, is that, the set of all shares, some possibly corrupted, can recover the correct secret. Though the concept of robustness is well studied for secret sharing schemes, it is not at all common in the field of visual cryptography. We, for the first time in the literature of visual cryptography, formally define the concept of robustness and put forward (2, n)-threshold visual cryptographic schemes that are robust against deterministic cheating. In the robust secret sharing schemes it is assumed that the number of cheaters is always less than the threshold value so that the original secret is not recovered by the coalition of cheaters only. In the current paper, We consider three different scenarios with respect to the number of cheaters controlled by a centralized adversary. We first consider the existence of only one cheater in a (2, n)-threshold VCS so that the secret image is not recovered by the cheater. Next we consider two different cases, with number of cheaters being greater than 2, with honest majority and without honest majority.
机译:在本文中,我们考虑了一种特殊类型的秘密共享方案的稳健性,称为可视加密方案,其中秘密重建在视觉上进行,而不与其他秘密共享方案不同的数学计算。最初,审议秘密共享计划的推定认为,涉及议定书的损坏参与者以被动方式行事,并在重建秘密期间提交正确的股票。但是,在实际情况中可能不是这种情况。当参与者的一小部分恶意行为并提交不正确的股票时,这是一个最小的强大要求是,所有股份的集合可能损坏,可以恢复正确的秘密。虽然对秘密共享计划进行了很好的策略概念,但在视觉密码学领域并不常见。我们是在视觉密码学的文献中,正式定义了鲁棒性的概念,并提出了对确定性作弊的鲁棒性的(2,N)的视觉加密方案。在强大的秘密共享方案中,假设作弊者的数量总是小于阈值,以便仅由骗子的联盟恢复原始秘密。在目前的论文中,我们考虑了三种不同的情景,了解由集中对手控制的骗子数量。我们首先考虑在(2,n) - 阈值VCS中仅存在一个骗子,以便骗子未被骗子恢复。接下来我们考虑两种不同的案例,骗子数量大于2,诚实多数,没有诚实的多数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号