Cheating immune (2, n)-threshold visual secret sharing

被引:0
|
作者
De Prisco, Roberto [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we provide new (2, n)-threshold visual cryptography schemes. Our model is different from the one considered in [10]; in particular we aim at constructing cheating immune schemes without the use of extra information, like additional shares, or images as done in [10]. We have provided a formal definition of cheating which requires that a group of cheaters be able to deterministically force a honest participant to reconstruct a wrong secret. The (2, n)-threshold schemes that we provide do not allow such cheating, regardless of the number of cheaters.
引用
收藏
页码:216 / 228
页数:13
相关论文
共 50 条
  • [1] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [2] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [3] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [4] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [6] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    [J]. DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504
  • [7] A (t, n) threshold quantum visual secret sharing
    Liu, Wenjie
    Xu, Yinsong
    Chen, Junxiu
    Yang, Ching-Nung
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 33 (02) : 74 - 84
  • [8] New cheating immune secret sharing function
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    [J]. Beijing Youdian Daxue Xuebao, 2006, 4 (54-56):
  • [9] Further Results of Cheating Immune Secret Sharing
    ZHANG Jie~(1
    2.State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 26 - 28
  • [10] Two polynomials based (t, n) threshold secret sharing scheme with cheating detection
    Biswas, Anindya Kumar
    Dasgupta, Mou
    [J]. CRYPTOLOGIA, 2020, 44 (04) : 357 - 370