Zurich University, 11 April 2007.  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
Visual Cryptography Moni Naor Adi Shamir Presented By:
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
8.3 Representing Relations Connection Matrices Let R be a relation from A = {a 1, a 2,..., a m } to B = {b 1, b 2,..., b n }. Definition: A n m  n connection.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Information and Coding Theory
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
MVI Function Review Input X is p -valued variable. Each Input can have Value in Set {0, 1, 2,..., p i-1 } literal over X corresponds to subset of values.
THE DIMENSION OF A VECTOR SPACE
An Efficient Construction of Secret Sharing for Generalized Adversary Structure and Its Reduction Communications, Circuits and Systems, ICCCAS 2004.
4 4.6 © 2012 Pearson Education, Inc. Vector Spaces RANK.
Copyright © Cengage Learning. All rights reserved.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach Wayne Lawton Department of Mathematics National University of Singapore S ,
Chapter 5: The Orthogonality and Least Squares
1 Part II: Linear Algebra Chapter 8 Systems of Linear Algebraic Equations; Gauss Elimination 8.1 Introduction There are many applications in science and.
Digital Image Processing, 3rd ed. © 1992–2008 R. C. Gonzalez & R. E. Woods Gonzalez & Woods Matrices and Vectors Objective.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
1 © 2010 Pearson Education, Inc. All rights reserved © 2010 Pearson Education, Inc. All rights reserved Chapter 9 Matrices and Determinants.
Chapter 3 Vector Spaces. The operations of addition and scalar multiplication are used in many contexts in mathematics. Regardless of the context, however,
Mathematics.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Great Theoretical Ideas in Computer Science.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
4.6: Rank. Definition: Let A be an mxn matrix. Then each row of A has n entries and can therefore be associated with a vector in The set of all linear.
DIGITAL COMMUNICATIONS Linear Block Codes
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.
Hamming codes. Golay codes.
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
1.1 Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Chapter 9. Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Cryptography and Coding Theory
CSCI 115 Chapter 1 Fundamentals. CSCI 115 §1.1 Sets and Subsets.
SECTION 2 BINARY OPERATIONS Definition: A binary operation  on a set S is a function mapping S X S into S. For each (a, b)  S X S, we will denote the.
Relations and Functions ORDERED PAIRS AND CARTESIAN PRODUCT An ordered pair consists of two elements, say a and b, in which one of them, say a is designated.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
4 4.5 © 2016 Pearson Education, Inc. Vector Spaces THE DIMENSION OF A VECTOR SPACE.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
1 Objective To provide background material in support of topics in Digital Image Processing that are based on matrices and/or vectors. Review Matrices.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Fourier transform.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
REVIEW Linear Combinations Given vectors and given scalars
Unit-III Algebraic Structures
3.1 Introduction to Determinants
9. Counting and Probability 1 Summary
Matrices and Vectors Review Objective
Computational Molecular Biology
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach
4.6: Rank.
Section 2.4 Matrices.
Sampling and Quantization
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Objective To provide background material in support of topics in Digital Image Processing that are based on matrices and/or vectors.
Systems of distinct representations
Advanced consistency methods Chapter 8
A Secret Enriched Visual Cryptography
Optimal XOR based (2,n)-Visual Cryptography Schemes
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Cheating and Prevention in Visual Secret Sharing
Presentation transcript:

Zurich University, 11 April 2007

 A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified subsets of participants can recover the secret(Qualified subsets).

 Let P={1,..,n} be a set of elements called participants.  2^P denote the set of all subsets of P.  Q: members of qualified sets.  F : members of forbidden sets.  Q  2^P and F  2^P, Q  F= .   =(Q,F) is called the access structure of the schemes.   _0 : Call all the minimal qualified sets of  basis for access structure  and show them by  _0:  _0={A  Q : B  Q for all B  A, B ≠ A}.

 A secret sharing scheme is perfect if all authorized subsets can reconstruct the secret but no other subset can determine any information about the secret. This scheme is not perfect!

 Secret s for the (k, n)-threshold 1. Consider a finite field GF(q) where q ≥n Choose a secret key s from GF(q). 3. Randomly choose m 1, m 2,…, m k-1 from GF(q), 4. Freely choose distinct x i (1 ≤i≤n). 5. Give to person i Secret share (x i, F(x i )) for all (1 ≤i≤n).

 Secret Image: The Secret consists of a collection of black and white pixels.  Share: Secret image encode into n shadow images in the form of the transparencies, called shares, where each participant receives one share.  Subpixel: Each pixel is divided into a certain number of subpixels.

   

2 out of 2 PixelProbability Shares #1 #2 Superposition of the two shares White Pixels Black Pixels

(0,1,0,1,0) (1,1,0,0,1) Sticking (1,1,0,1,1) Representation with Matrix [ ]

 Pixel Matrix: An n  m Boolean matrix S=[Sij] where Sij= 1 iff the j-th subpixel in the i-th transparency is black.  Hamming weight w(V): The number of non-zero symbols in a symbol V. Since we are working with binary representation, Hamming weight V is the number of “ 1 ” bits in the binary sequence V. V=(0,1,0,1,0)w(V)= 2

` PixelProbability Shares #1 #2 Superposition of the two shares 1 0 [] [0 1 ] [] [] C_0 C_1 Same Matrices with Same Frequency

 The number of sub-pixels that each pixel of the original image is encoded into on each transparency is termed pixel expansion.  The difference measure between a black and a white pixel in the reconstructed image is called contrast. [0 1 ][ [[]]] Expansion = 2 Contrast=( 2-1)/2=0.5 [

 Let  =(Q, F) be an access structure on a set of n participants. A  - VCS with expansion m and contrast  (m) consists of two collections of n×m matrices C_0 and C_1 such that: I. For any qualified subset X={i_1,…,i_k} and A ε C_0, the or V of rows i_1,…,i_t of A satisfies w(V)  t_X-  (m).m ; whereas, for any B ε C_1 it results that w(V)  t_X. II. For any non-qualified subset X={i_1,…,i_k}. The two collections of k×m matrices D_j, with j ε {0,1}, obtained by restricting each n×m matrix in C_j to rows i_1,…,i_k are indistinguishable in the sense that they contain the same matrices with the same frequencies.

1 0 [][0 1 ] [] [] C_0 C_1 X={ 1,2}, W(V)=2 X={ 1,2}, W(V)=1 D_0 D_1 X={ 1 }

 Let  =(Q, F) be an access structure on a set of n participants. A basis for  - VCS with expansion m and contrast  (m) consists of two matrices C^0 and C^1 such that: I. For any qualified subset X={i_1,…,i_k}, the or V of rows i_1,…,i_t of C^0 satisfies w(V)  t_X-  (m).m ; whereas, for C^1 it results that w(V)  t_X. II. For any non-qualified subset X={i_1,…,i_k}. The two k×m matrices D^j, with j ε {0,1}, obtained by restricting rows i_1,…,i_k to C^j are equal up to a permutation of columns.

{1} {2} {3} {1,2,3} [ { } {1,2} {1,3} {2,3} ][] C^1= C^0= C_1={A: A is a permutation column of C^1} C_0={B: B is a permutation column of C^0}

1. There is a k out of k scheme with expansion 2 k-1 and contrast α=2 -k In any k out of k scheme m≥2 k-1 and α≤2 1-k. 3. For any n and k, there is a k out of n VCS with m=log n 2 O(klog k), α=2 Ώ(k).

Question: Let  be a access structure. Is there an  -VC S ? Note that if there exists an  -VCS then  should be monotone. Theorem: Let  =(Q,F) be a monotone access structure where F=Q, and let Z_M be the family of maximal forbidden sets in F. Then there exists a  -VCS with expansion less than or equal to 2^(|Z_M|-1).

 Let  =(Q,F) be a monotone access structure with n participants where F is complement of Q. Also, let F_1,…, F_t be maximal forbidden sets in F.  Let S^0 and S^1 be basis of white matrix and black matrix of t out of t VCS, respectively.  Construct n×2^(t-1) white basis matrix C^0 and black basis matrix C^1 of  as follows: I. For any participant i, set the i-th row of C^0 be the or of rows i_1,…,i_s of S^0 that i_1,…,i_s are rows of S^0 where for any 1 ≤j≤s, “ i’’ is not member of F_(i_j). II. Similarly, construct C^1.

Example: Let P={1, 2, 3, 4},  _0={{1, 2}, {2, 3}, {3, 4}}, and Z_M={{1, 4}, {1, 3}, {2, 4}}. Hence,

Color of Secret  Let  =(Q, F) be an access structure on a set of n participants. A  - VCS with expansion m and contrast  (m) consists of two collections of n×m matrices C_0 and C_1 such that: I. For any qualified subset X={i_1,…,i_k} and A ε C_0, the or V of rows i_1,…,i_t of A satisfies w(V) = t_X; whereas, II. For any non-qualified subset X={i_1,…,i_k}. The two collections of k×m matrices D_j, with j ε {0,1}, obtained by restricting each n×m matrix in C_j to rows i_1,…,i_k are indistinguishable in the sense that they contain the same matrices with the same frequencies. for any B ε C_1 it results that w(V)  t_X-  (m).m or for any B ε C_1 w(V) ≤ t_X-  (m).m.

 In 1998, S. Droste introduced an extension of the visual cryptography. In fact, he has presented an extended VCS in which every combination of the transparencies can contain independent information.  In 2001, G. Ateniese, C. Blundo, A. Santis and D.R. Stinson has introduced another version of extended visual cryptography in which every share have to be an image.