Cheating immune (2, n)-threshold visual secret sharing

被引:0
|
作者
De Prisco, Roberto [1 ]
De Santis, Alfredo [1 ]
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cheating in secret sharing has been considered in several papers. Recently cheating in visual cryptography has been considered in [10], where (2, n)-threshold visual cryptography schemes are provided. In this paper we provide new (2, n)-threshold visual cryptography schemes. Our model is different from the one considered in [10]; in particular we aim at constructing cheating immune schemes without the use of extra information, like additional shares, or images as done in [10]. We have provided a formal definition of cheating which requires that a group of cheaters be able to deterministically force a honest participant to reconstruct a wrong secret. The (2, n)-threshold schemes that we provide do not allow such cheating, regardless of the number of cheaters.
引用
收藏
页码:216 / 228
页数:13
相关论文
共 50 条
  • [41] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [42] Real-time cheating immune secret sharing for remote sensing images
    Shivendra Shivani
    Subhash Chandra Patel
    Vinay Arora
    Bhisham Sharma
    Alireza Jolfaei
    Gautam Srivastava
    [J]. Journal of Real-Time Image Processing, 2021, 18 : 1493 - 1508
  • [43] Cheating-immune secret sharing schemes from codes and cumulative arrays
    dela Cruz, Romar
    Wang, Huaxiong
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2013, 5 (01): : 67 - 83
  • [44] Multi-factor cheating prevention in visual secret sharing by hybrid codebooks
    Lin, Chih-Hung
    Chen, Tzung-Her
    Wu, Yan-Ting
    Tsao, Kai-Hsiang
    Lin, Kai-Siang
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (07) : 1543 - 1557
  • [45] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93
  • [46] Cheating-immune secret sharing schemes from codes and cumulative arrays
    Romar dela Cruz
    Huaxiong Wang
    [J]. Cryptography and Communications, 2013, 5 : 67 - 83
  • [47] Real-time cheating immune secret sharing for remote sensing images
    Shivani, Shivendra
    Patel, Subhash Chandra
    Arora, Vinay
    Sharma, Bhisham
    Jolfaei, Alireza
    Srivastava, Gautam
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2021, 18 (05) : 1493 - 1508
  • [48] Cheating immune multi-secret sharing without predefined order of secrets
    Lin, Changlu
    Yan, Xingfu
    Niu, Qiwen
    Hu, Huidan
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 15 - 19
  • [49] A (n, n)-threshold Secret Sharing Scheme for Barcode Application
    Lin, Pei-Yu
    Chen, Yi-Hui
    Chuang, Jun-Chou
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1023 - 1028
  • [50] An enhanced threshold visual secret sharing based on random grids
    Xuehu Yan
    Xin Liu
    Ching-Nung Yang
    [J]. Journal of Real-Time Image Processing, 2018, 14 : 61 - 73