透過您的圖書館登入
IP:3.145.16.90
  • 期刊

On Visual False Positive Secret in 2-out-of-n Visual Cryptography

2-out-of-n視覺密碼學之視覺偽分享秘密之研究

摘要


1995年,Naor和Shamir兩位學者共同提出了一個具有絶對安全性的秘密分享機制:視覺密碼學。在這一篇論文中,我們提出視覺密碼學中存在視覺偽分享秘密。視覺偽分享秘密將會造成合法使用者透過視覺解密求得不存在的偽秘密。就我們所知,本篇論文是在文獻中首次嘗試證明,在未受攻擊下視覺密碼學可能將造成合法使用者和以視覺密碼學為主的應用技術受到不可預料的安全威脅。本文中的實驗和分析結果說明視覺偽分享秘密確實存在於2-out-of-n視覺密碼學中。

並列摘要


In 1994, Naor and Shamir proposed a secret sharing scheme with perfect security, called Visual Cryptography. In this paper, we address the issue of visual false positive secret, visual false positive black pixels and visual false positive white pixels, where qualified subsets of participants may visually recognize and accept these pixels as secret which is not true. To our best knowledge, this paper is the first attempt in the literature to demonstrate Visual Cryptography could cause unpredictable damages to qualified subsets of participants and applications based on it without suffering malicious attacks. The experimental results and the analysis demonstrate that visual false positive secret is possible in 2-out-of-n Visual Cryptography.

參考文獻


A. Shamir and M. Naor. Visual Cryptography II: Improving the Contrast via the Cover Base, Security in Communication Networks, September 16-17. (1996).
A. Shamir, How to share a secret, Comm. ACM, Vol. 22 (1979) pp. 612-613.
C. Blundo, A. De Santis and M. Naor, Visual cryptography for grey level images, Information Processing Letters, Vol. 75, No.6, 255-259. (2000)
C. Blundo, P. D'Arco, A. De Santis, D. R. Stinson, Contrast optimal Threshold Visual Cryptography Schemes, SIAM J. Discrete Math. 16(2) 224-261(2003).
C.C. Chang, and J.C. Chuang, An image intellectual property protection scheme for gray-level image using visual secret sharing strategy, Pattern Recognition Letters, Vol. 23 931-941(2002).

延伸閱讀