On Cheating in Visual Cryptography
碩士 === 國立中興大學 === 資訊科學研究所 === 91 === A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of s...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73127035023480845097 |
id |
ndltd-TW-091NCHU0394031 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091NCHU03940312015-10-13T17:02:17Z http://ndltd.ncl.edu.tw/handle/73127035023480845097 On Cheating in Visual Cryptography 論視覺密碼學之欺騙問題與防禦機制 Dushiau Tsai 蔡篤校 碩士 國立中興大學 資訊科學研究所 91 A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of secret sharing scheme called k-out-of-n threshold visual cryptography where the shares given to participants are xeroxed onto transparencies. If more then k transparencies are stacked together, the secret message can visually recovered by anyone without any cryptographic knowledge and without performing any cryptographic computation. In this thesis, we consider the cheating problem in visual cryptography. We show that cheating is possible when the cheaters form a coalition to deceive honest participants. For preventing cheating, an explicit definition of cheating is given; moreover, two cheating protection schemes are proposed to safeguard the honest participants in visual cryptography. Gwoboa Horng 洪國寶 2003 學位論文 ; thesis 47 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊科學研究所 === 91 === A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of secret sharing scheme called k-out-of-n threshold visual cryptography where the shares given to participants are xeroxed onto transparencies. If more then k transparencies are stacked together, the secret message can visually recovered by anyone without any cryptographic knowledge and without performing any cryptographic computation.
In this thesis, we consider the cheating problem in visual cryptography. We show that cheating is possible when the cheaters form a coalition to deceive honest participants. For preventing cheating, an explicit definition of cheating is given; moreover, two cheating protection schemes are proposed to safeguard the honest participants in visual cryptography.
|
author2 |
Gwoboa Horng |
author_facet |
Gwoboa Horng Dushiau Tsai 蔡篤校 |
author |
Dushiau Tsai 蔡篤校 |
spellingShingle |
Dushiau Tsai 蔡篤校 On Cheating in Visual Cryptography |
author_sort |
Dushiau Tsai |
title |
On Cheating in Visual Cryptography |
title_short |
On Cheating in Visual Cryptography |
title_full |
On Cheating in Visual Cryptography |
title_fullStr |
On Cheating in Visual Cryptography |
title_full_unstemmed |
On Cheating in Visual Cryptography |
title_sort |
on cheating in visual cryptography |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/73127035023480845097 |
work_keys_str_mv |
AT dushiautsai oncheatinginvisualcryptography AT càidǔxiào oncheatinginvisualcryptography AT dushiautsai lùnshìjuémìmǎxuézhīqīpiànwèntíyǔfángyùjīzhì AT càidǔxiào lùnshìjuémìmǎxuézhīqīpiànwèntíyǔfángyùjīzhì |
_version_ |
1717779510108094464 |