XOR-based Visual Cryptography Schemes

被引:0
|
作者
P. Tuyls
H. D. L. Hollmann
J. H. Van Lint
L. Tolhuizen
机构
[1] Philips Research Laboratories,Department of Mathematics and Computer Science
[2] Eindhoven University of Technology,undefined
来源
Designs, Codes and Cryptography | 2005年 / 37卷
关键词
Threshold visual secret sharing schemes; XOR; MDS codes;
D O I
暂无
中图分类号
学科分类号
摘要
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.
引用
收藏
页码:169 / 186
页数:17
相关论文
共 50 条
  • [31] XOR-based schemes for fast parallel IP lookups
    Bongiovanni, G
    Penna, P
    ALGORITHMS AND COMPLEXITY, PROCEEDINGS, 2003, 2653 : 238 - 250
  • [32] XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes
    Huang, Sheng-Yao
    Lo, An-hui
    Juan, Justie Su-Tzu
    APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [33] XOR-based schemes for fast parallel IP lookups
    Bongiovanni, G
    Penna, P
    THEORY OF COMPUTING SYSTEMS, 2005, 38 (04) : 481 - 501
  • [34] Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System
    Naidu, P. Sanyasi
    Kharat, Reena
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 52 - 62
  • [35] An efficient XOR-based verifiable visual cryptographic scheme
    Jia, Xingxing
    Wang, Daoshun
    Chu, Qimeng
    Chen, Zhenhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8207 - 8223
  • [36] An efficient XOR-based verifiable visual cryptographic scheme
    Xingxing Jia
    Daoshun Wang
    Qimeng Chu
    Zhenhua Chen
    Multimedia Tools and Applications, 2019, 78 : 8207 - 8223
  • [37] Automatic analysis of the security of XOR-based key management schemes
    Cortier, Veronique
    Keighren, Gavin
    Steel, Graham
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2007, 4424 : 538 - +
  • [38] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483
  • [39] Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares
    Xi-Wen Wu
    Tzung-Her Chen
    Multimedia Tools and Applications, 2024, 83 : 28913 - 28926
  • [40] XOR-based unexpanded meaningful visual secret sharing scheme
    Kannojia S.P.
    Kumar J.
    International Journal of Security and Networks, 2019, 14 (01) : 1 - 9