Cheating immune (2, n)-threshold visual secret sharing

被引:0
|
作者
De Prisco, Roberto [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we provide new (2, n)-threshold visual cryptography schemes. Our model is different from the one considered in [10]; in particular we aim at constructing cheating immune schemes without the use of extra information, like additional shares, or images as done in [10]. We have provided a formal definition of cheating which requires that a group of cheaters be able to deterministically force a honest participant to reconstruct a wrong secret. The (2, n)-threshold schemes that we provide do not allow such cheating, regardless of the number of cheaters.
引用
收藏
页码:216 / 228
页数:13
相关论文
共 50 条
  • [31] Visual secret sharing scheme with (n,n) threshold based on WeChat Mini Program codes
    Chen, Jia
    Wang, Yongjie
    Yan, Xuehu
    Wang, Jiayu
    Li, Longlong
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 82
  • [32] A (2,2) and (n, n)-Threshold Random Grid-Based Visual Secret Sharing Using Chaos Theory
    Koikara, R.
    Hidayat, A. S.
    Paul, A.
    Yoo, K. -Y.
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2527 - 2531
  • [33] An ( n, n) threshold Visual Cryptography Scheme for Cheating prevention
    Chen, Qin
    Peng, Wen-Fang
    Zhang, Min
    Chu, Yi-Ping
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 587 - 592
  • [34] Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme
    Agematsu, Tomoki
    Obana, Satoshi
    [J]. 2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019), 2019, : 1 - 9
  • [35] Threshold visual secret sharing based on Boolean operations
    Kumar, Sachin
    Sharma, Rajendra K.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 653 - 664
  • [37] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
  • [38] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [39] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878
  • [40] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018