Cheating and Prevention in Visual Secret Sharing

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Secure Multiparty Computations on Bitcoin
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Ch12. Secret Sharing Schemes
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Secret Sharing Algorithms
K-Anonymous Message Transmission Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Chapter 3: Basic Protocols Dulal C. Kar. Key Exchange with Symmetric Cryptography Session key –A separate key for one particular communication session.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
Encryption Extensions Model based on Hidden Attribute Certificate LI Yu 1,2,3, ZHAO Yong 1,2,3, GONG Bei 1 1 College of Computer Science and Technology,
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Zhaoxia Fu, Yan Han Measurement Volume 45, Issue 4, May 2012, Pages 650–655 Reporter: Jing-Siang, Chen.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Cryptographic Protocols Secret sharing, Threshold Security
Asymmetric-Key Cryptography
影像偽裝術 Dr. Chin-Chen Chang
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Ch12. Secret Sharing Schemes
Der-Chyuan Lou and Jiang-Lung Liu,
An efficient threshold RSA digital signature scheme
MPC and Verifiable Computation on Committed Data
Secret Sharing (or, more accurately, “Secret Splitting”)
Cryptography CS 555 Lecture 22
Content-Sensitive Screening in Black and White
PART VII Security.
Symmetric-Key Cryptography
Source: Signal Processing 109 (2015) 317–333
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
The Recent Developments in Visual Secret Sharing
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
For ASIACRYPT 2018 Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem Fuyou Miao University of Science and Technology of China.
A Secret Enriched Visual Cryptography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Cryptology Design Fundamentals
Sharing Technologies for Cloud Computing
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Secret image sharing with steganography and authentication
Cryptographic Protocols Secret Sharing, Threshold Security
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Cheating and Prevention in Visual Secret Sharing 陳昱圻 博士 中央研究院 資訊科學研究所

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Treasure Map  Secret Sharing 2019/10/14

Treasure Map  Secret Sharing 2019/10/14

Secret Sharing Secret is the treasure or the map. How to share the secret? Three pieces of the treasure map. How to get the secret? Only three men together. Any one cannot. 2019/10/14

How to Share a Secret Secret sharing: distributing a secret among a group of participants. A dealer (a trusted party) allocates each of participants a share of the secret. The secret can only be recovered when the shares are combined together. 2019/10/14

Threshold Secret Sharing: 2-out-of-3 SS Dealer secret (2, 3)-secret sharing Captain America Iron Man Hulk shares secret retrieval 2019/10/14

Share Generation (2-out-of-3) Secret: K=3 [Shamir’s method] It is super easy to know (1, 5), (2, 7)  f(x)=2x+3 (1, 5), (3, 9)  f(x)=2x+3 (2, 7), (3, 9)  f(x)=2x+3 K=3 Pick a=2 Generate f(x)=ax+K f(x)=2x+3 (1, 5) (2, 7) (3, 9) Get three points (1, 5), (2, 7), (3, 9) a=2, K=3 2019/10/14

Share Generation (2-out-of-3) y S3=(3,9) (0,K=3) S2=(2,7) S1=(1,5) x Any two points can decide the line. 2019/10/14

How about k-out-of-n 1. Pick random ak-1, ak-2, …, a1 2. f(x) = ak-1xk-1 + ak-2xk-2 + … a1x + K 3. Generate (x1,y1), (x2,y2), …, (xn, yn) 4. Distribute (xi,yi) to User i 2019/10/14

Secret Recovery 1. Pick random ak-1, ak-2, …, a1 2. f(x) = ak-1xk-1 + ak-2xk-2 + … a1x + K 3. Generate (x1,y1), (x2,y2), …, (xn, yn) k users have (x1,y1), … (xk,yk) 4. Distribute (xi,yi) to User i 2019/10/14

Security Solve ak-1, …, a1, K We must have k following equations (x1, y1) y1 = ak-1(x1)k-1 + … a1(x1) + K … (xk, yk) yk = ak-1(xk)k-1 + … a1(xk) + K Any k-1 users cannot compute ak-1, …, a1, K Only k-1 equations. 2019/10/14

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Secret Sharing without … Visual Secret Sharing is secret sharing. No computation in share recovery We do not use any computer. Human visual system 2019/10/14

Treasure Map  VSS 2019/10/14

Visual Secret Sharing k-out-of-n VSS Secret: a secret image Total n participants Any k can get the secret Secret: a secret image Share generation, run by the dealer Share recovery, run by k participants 2019/10/14

Result of 2-out-of-3 VSS A secret retrieval: stacking secret image (2, 3)-visual secret sharing Transparencies (shares/shadows) secret retrieval: stacking 2019/10/14

Share Generation A Input: a secret image Deal with black and white pixels separately A pixel will be extended to some subpixels secret image Ex: 2-out-of-3 1 pixel 3 subpixels 2019/10/14

Share Generation Use base matrices Encode white pixels by using CW Encode black pixels by using CB Column permutation P1 P2 P3 2019/10/14

Share Generation (2,3)-VSS 2019/10/14

A secret image T1 T2 T3 2019/10/14

Share Recovery Stack the shares (OR operation) 1 T1 T1 T2 T1+T2 T3 1 T1 T1 T2 T1+T2 T3 2019/10/14

Share Recovery 1 1 1 1 1 1 T1 T1+T2 1 1 T2 T2+T3 1 1 1 1 T3 T1+T3 OR T1+T2 1 T2 1 1 T2+T3 T3 1 T1+T3 1 OR T1 1 T1+T2 1 T2 1 1 T2+T3 T3 1 T1+T3 1 2019/10/14

Review A secret retrieval: stacking secret image (2, 3)-visual secret sharing Transparencies (shares/shadows) secret retrieval: stacking 2019/10/14

(2, n) visual secret sharing Generally, we can use the following base matrices to construct a (2,n)-VSS. n n 2019/10/14

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Cheating Dishonest collusive parties want to fool an honest one Assume n-1 cheaters and one victim. Probability = 1 2019/10/14

Cheating We want to fool Hulk. 2019/10/14

How to do for white pixel Hulk’s is [1 0 0]. [1 0 0] [1 0 0] 2019/10/14

How to do for black pixel Hulk’s is [1 0 0]. [0 0 1] [0 1 0] 2019/10/14

The original pixel is black We want to fool Hulk. Ex: The original pixel is black [0 1 0] [0 0 1] [1 0 0] [1 0 0] [1 0 0] + [1 0 0] = [1 0 0] White Generate a fake transparency collusively. Give FT to Hulk 2019/10/14

Haha.. The real secret is A. Oh! The secret is F. Haha.. The real secret is A. FT+T3 T1+T2 2019/10/14

Result of Cheating in (2,3)-VSS T1+T2 T1+T3 T2+T3 FT FT+T3 2019/10/14

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Two directions to prevent The base matrices can inherently prevent cheating. The victim can verify that the share is valid or not. Share and blind authentication 2019/10/14

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Horng et al.’s scheme 1 Verification logo LC Stacking VC and SA, LC is shown on the left-top corner Stacking VC and SB, LC is shown on the right-top corner 2019/10/14

Logo Verification Insecure region 2019/10/14

Horng et al.’s scheme 2 2019/10/14

2-out-of-(n+1)-VSS T1 T1 T2 T2 T3 T3 WTH, T3 could be [0 1 0 0] or [0 0 0 1] T1 T2 Pr = ½ Black pixels are secure 2019/10/14

2-out-of-(n+1)-VSS T1 T1 T2 T2 T3 T3 Haha…, we know T3 is [1 0 0 0] T1 Pr = 1 White pixels are insecure 2019/10/14

Set a verification image Hu-Tzeng’s scheme B Set a verification image 2019/10/14

Hu-Tzeng’s scheme Shares generating (base matrices): CW= CB= Extra subpixels (verifying). 2019/10/14

Hu-Tzeng’s scheme Verification shares generating: If the pixel in VI is black, the sibpixels are [0 1 0 0 0]. (which corresponds to the permutation of basic matrices) If the pixel in VI is white, the sibpixels are [1 0 0 0 0]. Extra subpixels. 2019/10/14

Result Example: T1[1 0 1 0 0] (white) T1, T2, T3 T2[1 0 0 1 0] (white) T1+T2, T1+T3, T2+T3 T1+T2[1 0 1 1 0] (black) V1, V2, V3 V2[0 1 0 0 0] (white +) V1+T2, V1+T3, V2+T1 T1+V2[1 1 1 0 0] (black) V2+T3, V3+T1, V3+T2 2019/10/14

Problem of Hu-Tzeng’s scheme 2019/10/14

Problem of Hu-Tzeng’s scheme Black or white pixel is insecure in Hu-Tzeng’s scheme. V1 = [1 0 0 0 0] T1 = [1 0 1 0 0] Added columns Original columns T3 = [1 0 0 0 1] V2 = [0 1 0 0 0] T2 = [1 0 0 1 0] T1+T2 = [1 0 1 1 0] is Black 2019/10/14

Improvement (Chen et al.) Shares generating (base matrices): CW= CB= 2019/10/14

Share Authentication Horng et al. 2006: Verification logo and verification shares  Insecure Hu-Tzeng 2007: Added columns and verification shares  Insecure Chen et al. 2012: Added columns and verification shares  Secure 2019/10/14

Share Authentication Horng et al. 2006: Insecure Hu-Tzeng 2007: Insecure Chen et al. 2012: Secure Verification patterns with verification shares Verification logos without verification shares 2019/10/14

Verification patterns with verification shares T1 and V1 T2 and V2 T3 and V3 Number of patterns: n1 Number of patterns: n2 n1, n2 & n3 Number of patterns: n3 2019/10/14

This figure is from J. Vis. Commun. Image R. 23 (2012) page 1229. 2019/10/14

Verification logos without verification shares Logo: L1 Logo: L2 L1, L2 & L3 Logo: L3 2019/10/14

Ex: if T1+T? and no two D, we will find T? is FT. L1 = D, L2 = A, L3 = B, Secret = CC Ex: if T1+T? and no two D, we will find T? is FT. This figure is from Digital Signal Processing 23 (2013)page 1501. 2019/10/14

Comparisons Horng et al. (Verification logos): Insecure Hu-Tzeng (Added columns): Insecure Chen et al. (Improvement from HT): Secure Chen et al. (Verification patterns): Secure Chen et al. (Verification logos): Secure 2019/10/14

Outline Secret Sharing Visual Secret Sharing (VSS) Cheating Problem in VSS How to Prevent Cheating Attacks Cheating Immune VSS Schemes Conclusions 2019/10/14

Conclusions Cheating is a security issue in visual secret sharing. Two notions are presented to prevent cheating. Some cheating immune schemes are introduced. 2019/10/14

Thanks for your attention Yu-Chi Chen Institute of Information Science Academia Sinica wycchen@iis.sinica.edu.tw 2019/10/14