Abstract
A visual cryptography scheme for a set P of n participants is a method to encode a secret image SI into n images in such a way that any participant in P receives one image and only qualified subsets of participants can “visually” recover the secret image, but non-qualified sets of participants have no information, in an information theoretical sense, on SI. A “visual” recover for a set X \(\subseteq \) P consists of stacking together the images associated to participants in X. The participants in a qualified set X will be able to see the secret image without any knowledge of cryptography and without performing any cryptographic computation.
In this paper we propose two techniques to construct visual cryptography schemes for any access structure. We analyze the structure of visual cryptography schemes and we prove bounds on the size of the image distributed to the participants in the scheme. We provide a novel technique to realize k out of n visual cryptography schemes. Finally, we consider graph-based access structures, that is access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme. Our constructions for 2 out of n visual cryptography schemes are the best possible with respect to pixel expansion and relative difference.
Research of C. Blundo and A. De Santis is partially supported by Italian Ministry of University and Research (M.U.R.S.T.) and by National Council for Research (C.N.R.). Research of D. R. Stinson is supported by NSF grant CCR-9402141.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures. Available from ECCC, Electronic Colloquium on Computational Complexity (TR96-012), via WWW using http://www.eccc.uni-trier.de/eccc/.
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Extended Schemes for Visual Cryptography, preprint, 1995.
M. Atici, S. S. Magliveras, D. R. Stinson, and W.-D. Wei, Some Recursive Constructions for Perfect Hash Families, Technical Report UNL, Univ. of NebraskaLincoln, June 1995.
C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, Journal of Cryptology, Vol. 8, (1995), pp. 39–64.
M. L. Fredman and J. Komlós, On the Size of Separating System and Families of Perfect Hash Functions, SIAM J. Alg. Disc. Meth., Vol 5, No 1, March 1984.
J. H. van Lint and R. M. Wilson, A Course in Combinatorics, Cambridge University Press, (1992).
K. Melhorn, On the Program Size of Perfect and Universal Hash Functions, in Proc. of 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 170–175, 1982.
M. Naor and A. Shamir, Visual Cryptography, in “Advances in Cryptology — Eurocrypt '94”, A. De Santis Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1–12, 1995.
P. Elias, Zero Error Capacity Under List Decoding, IEEE Trans. Inform. Theory, Vol. 34, 1988.
G. J. Simmons, W. Jackson, and K. Martin, The Geometry of Shared Secret Schemes, Bulletin of the ICA, 1:71–88, 1991.
D. R. Stinson, Decomposition Constructions for Secret Sharing Schemes, IEEE Trans. Inform. Theory, Vol. 40, pp. 118–125, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R. (1996). Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, vol 1099. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61440-0_147
Download citation
DOI: https://doi.org/10.1007/3-540-61440-0_147
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61440-1
Online ISBN: 978-3-540-68580-7
eBook Packages: Springer Book Archive