Visual Cryptography for General Access Structures

A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image, but other, forbidden, sets of particip...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Information and computation 1996-09, Vol.129 (2), p.86-106
Hauptverfasser: Ateniese, Giuseppe, Blundo, Carlo, De Santis, Alfredo, Stinson, Douglas R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 106
container_issue 2
container_start_page 86
container_title Information and computation
container_volume 129
creator Ateniese, Giuseppe
Blundo, Carlo
De Santis, Alfredo
Stinson, Douglas R.
description A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) onSI. A “visual” recovery for a setX⊆P consists of xeroxing the shares given to the participants inXonto transparencies, and then stacking them. The participants in a qualified setXwill be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques for constructing visual cryptography schemes for general access structures. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the shares distributed to the participants in the scheme. We provide a novel technique for realizingkout ofnthreshold visual cryptography schemes. Our construction forkout ofnvisual cryptography schemes is better with respect to pixel expansion than the one proposed by M. Naor and A. Shamir (Visual cryptography,in“Advances in Cryptology—Eurocrypt '94” CA. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1–12, Springer-Verlag, Berlin, 1995) and for the case of 2 out ofnis the best possible. Finally, we consider graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme.
doi_str_mv 10.1006/inco.1996.0076
format Article
fullrecord <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1006_inco_1996_0076</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0890540196900760</els_id><sourcerecordid>S0890540196900760</sourcerecordid><originalsourceid>FETCH-LOGICAL-c421t-4f34c56ea0d9dffb806db447bbf38b1d92f2f7ced0e208e3590322f44205025d3</originalsourceid><addsrcrecordid>eNp1j71PwzAQxS0EEqWwMmdgTbhzbDcZqwoKUiUGPlbLsc9gVJLITpHy35OoiI3pnnTv3b0fY9cIBQKo29DarsC6VgXASp2wBUINOVcST9kCqklLAXjOLlL6BECUQi0YvoV0MPtsE8d-6N6j6T_GzHcx21JLcVqsraWUsuchHuxwiJQu2Zk3-0RXv3PJXu_vXjYP-e5p-7hZ73IrOA658KWwUpEBVzvvmwqUa4RYNY0vqwZdzT33K0sOiENFpayh5NwLwUECl65csuJ418YupUhe9zF8mThqBD0D6xlYz8B6Bp4CN8dAb5I1ex9Na0P6S3FRS8RqslVHG03lvwNFnWygdmoSItlBuy789-EHzR1pJA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Visual Cryptography for General Access Structures</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>ScienceDirect Journals (5 years ago - present)</source><creator>Ateniese, Giuseppe ; Blundo, Carlo ; De Santis, Alfredo ; Stinson, Douglas R.</creator><creatorcontrib>Ateniese, Giuseppe ; Blundo, Carlo ; De Santis, Alfredo ; Stinson, Douglas R.</creatorcontrib><description>A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) onSI. A “visual” recovery for a setX⊆P consists of xeroxing the shares given to the participants inXonto transparencies, and then stacking them. The participants in a qualified setXwill be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques for constructing visual cryptography schemes for general access structures. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the shares distributed to the participants in the scheme. We provide a novel technique for realizingkout ofnthreshold visual cryptography schemes. Our construction forkout ofnvisual cryptography schemes is better with respect to pixel expansion than the one proposed by M. Naor and A. Shamir (Visual cryptography,in“Advances in Cryptology—Eurocrypt '94” CA. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1–12, Springer-Verlag, Berlin, 1995) and for the case of 2 out ofnis the best possible. Finally, we consider graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme.</description><identifier>ISSN: 0890-5401</identifier><identifier>EISSN: 1090-2651</identifier><identifier>DOI: 10.1006/inco.1996.0076</identifier><identifier>CODEN: INFCEC</identifier><language>eng</language><publisher>San Diego, CA: Elsevier Inc</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information retrieval. Graph ; Information, signal and communications theory ; Signal and communications theory ; Telecommunications and information theory ; Theoretical computing</subject><ispartof>Information and computation, 1996-09, Vol.129 (2), p.86-106</ispartof><rights>1996 Academic Press</rights><rights>1997 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c421t-4f34c56ea0d9dffb806db447bbf38b1d92f2f7ced0e208e3590322f44205025d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1006/inco.1996.0076$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,3548,27922,27923,45993</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=2495118$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Ateniese, Giuseppe</creatorcontrib><creatorcontrib>Blundo, Carlo</creatorcontrib><creatorcontrib>De Santis, Alfredo</creatorcontrib><creatorcontrib>Stinson, Douglas R.</creatorcontrib><title>Visual Cryptography for General Access Structures</title><title>Information and computation</title><description>A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) onSI. A “visual” recovery for a setX⊆P consists of xeroxing the shares given to the participants inXonto transparencies, and then stacking them. The participants in a qualified setXwill be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques for constructing visual cryptography schemes for general access structures. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the shares distributed to the participants in the scheme. We provide a novel technique for realizingkout ofnthreshold visual cryptography schemes. Our construction forkout ofnvisual cryptography schemes is better with respect to pixel expansion than the one proposed by M. Naor and A. Shamir (Visual cryptography,in“Advances in Cryptology—Eurocrypt '94” CA. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1–12, Springer-Verlag, Berlin, 1995) and for the case of 2 out ofnis the best possible. Finally, we consider graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information retrieval. Graph</subject><subject>Information, signal and communications theory</subject><subject>Signal and communications theory</subject><subject>Telecommunications and information theory</subject><subject>Theoretical computing</subject><issn>0890-5401</issn><issn>1090-2651</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1996</creationdate><recordtype>article</recordtype><recordid>eNp1j71PwzAQxS0EEqWwMmdgTbhzbDcZqwoKUiUGPlbLsc9gVJLITpHy35OoiI3pnnTv3b0fY9cIBQKo29DarsC6VgXASp2wBUINOVcST9kCqklLAXjOLlL6BECUQi0YvoV0MPtsE8d-6N6j6T_GzHcx21JLcVqsraWUsuchHuxwiJQu2Zk3-0RXv3PJXu_vXjYP-e5p-7hZ73IrOA658KWwUpEBVzvvmwqUa4RYNY0vqwZdzT33K0sOiENFpayh5NwLwUECl65csuJ418YupUhe9zF8mThqBD0D6xlYz8B6Bp4CN8dAb5I1ex9Na0P6S3FRS8RqslVHG03lvwNFnWygdmoSItlBuy789-EHzR1pJA</recordid><startdate>19960915</startdate><enddate>19960915</enddate><creator>Ateniese, Giuseppe</creator><creator>Blundo, Carlo</creator><creator>De Santis, Alfredo</creator><creator>Stinson, Douglas R.</creator><general>Elsevier Inc</general><general>Elsevier</general><scope>6I.</scope><scope>AAFTH</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>19960915</creationdate><title>Visual Cryptography for General Access Structures</title><author>Ateniese, Giuseppe ; Blundo, Carlo ; De Santis, Alfredo ; Stinson, Douglas R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c421t-4f34c56ea0d9dffb806db447bbf38b1d92f2f7ced0e208e3590322f44205025d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1996</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information retrieval. Graph</topic><topic>Information, signal and communications theory</topic><topic>Signal and communications theory</topic><topic>Telecommunications and information theory</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ateniese, Giuseppe</creatorcontrib><creatorcontrib>Blundo, Carlo</creatorcontrib><creatorcontrib>De Santis, Alfredo</creatorcontrib><creatorcontrib>Stinson, Douglas R.</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>Information and computation</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ateniese, Giuseppe</au><au>Blundo, Carlo</au><au>De Santis, Alfredo</au><au>Stinson, Douglas R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Visual Cryptography for General Access Structures</atitle><jtitle>Information and computation</jtitle><date>1996-09-15</date><risdate>1996</risdate><volume>129</volume><issue>2</issue><spage>86</spage><epage>106</epage><pages>86-106</pages><issn>0890-5401</issn><eissn>1090-2651</eissn><coden>INFCEC</coden><abstract>A visual cryptography scheme for a set P ofnparticipants is a method of encoding a secret imageSIintonshadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) onSI. A “visual” recovery for a setX⊆P consists of xeroxing the shares given to the participants inXonto transparencies, and then stacking them. The participants in a qualified setXwill be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation. In this paper we propose two techniques for constructing visual cryptography schemes for general access structures. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the shares distributed to the participants in the scheme. We provide a novel technique for realizingkout ofnthreshold visual cryptography schemes. Our construction forkout ofnvisual cryptography schemes is better with respect to pixel expansion than the one proposed by M. Naor and A. Shamir (Visual cryptography,in“Advances in Cryptology—Eurocrypt '94” CA. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1–12, Springer-Verlag, Berlin, 1995) and for the case of 2 out ofnis the best possible. Finally, we consider graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme.</abstract><cop>San Diego, CA</cop><pub>Elsevier Inc</pub><doi>10.1006/inco.1996.0076</doi><tpages>21</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0890-5401
ispartof Information and computation, 1996-09, Vol.129 (2), p.86-106
issn 0890-5401
1090-2651
language eng
recordid cdi_crossref_primary_10_1006_inco_1996_0076
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; ScienceDirect Journals (5 years ago - present)
subjects Applied sciences
Computer science
control theory
systems
Cryptography
Exact sciences and technology
Information retrieval. Graph
Information, signal and communications theory
Signal and communications theory
Telecommunications and information theory
Theoretical computing
title Visual Cryptography for General Access Structures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T19%3A01%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Visual%20Cryptography%20for%20General%20Access%20Structures&rft.jtitle=Information%20and%20computation&rft.au=Ateniese,%20Giuseppe&rft.date=1996-09-15&rft.volume=129&rft.issue=2&rft.spage=86&rft.epage=106&rft.pages=86-106&rft.issn=0890-5401&rft.eissn=1090-2651&rft.coden=INFCEC&rft_id=info:doi/10.1006/inco.1996.0076&rft_dat=%3Celsevier_cross%3ES0890540196900760%3C/elsevier_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S0890540196900760&rfr_iscdi=true