On Cheating in Visual Cryptography

碩士 === 國立中興大學 === 資訊科學研究所 === 91 === A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of s...

Full description

Bibliographic Details
Main Authors: Dushiau Tsai, 蔡篤校
Other Authors: Gwoboa Horng
Format: Others
Language:en_US
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/73127035023480845097
id ndltd-TW-091NCHU0394031
record_format oai_dc
spelling ndltd-TW-091NCHU03940312015-10-13T17:02:17Z http://ndltd.ncl.edu.tw/handle/73127035023480845097 On Cheating in Visual Cryptography 論視覺密碼學之欺騙問題與防禦機制 Dushiau Tsai 蔡篤校 碩士 國立中興大學 資訊科學研究所 91 A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of secret sharing scheme called k-out-of-n threshold visual cryptography where the shares given to participants are xeroxed onto transparencies. If more then k transparencies are stacked together, the secret message can visually recovered by anyone without any cryptographic knowledge and without performing any cryptographic computation. In this thesis, we consider the cheating problem in visual cryptography. We show that cheating is possible when the cheaters form a coalition to deceive honest participants. For preventing cheating, an explicit definition of cheating is given; moreover, two cheating protection schemes are proposed to safeguard the honest participants in visual cryptography. Gwoboa Horng 洪國寶 2003 學位論文 ; thesis 47 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學研究所 === 91 === A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. In 1994, Noar and Shamir proposed a variant of secret sharing scheme called k-out-of-n threshold visual cryptography where the shares given to participants are xeroxed onto transparencies. If more then k transparencies are stacked together, the secret message can visually recovered by anyone without any cryptographic knowledge and without performing any cryptographic computation. In this thesis, we consider the cheating problem in visual cryptography. We show that cheating is possible when the cheaters form a coalition to deceive honest participants. For preventing cheating, an explicit definition of cheating is given; moreover, two cheating protection schemes are proposed to safeguard the honest participants in visual cryptography.
author2 Gwoboa Horng
author_facet Gwoboa Horng
Dushiau Tsai
蔡篤校
author Dushiau Tsai
蔡篤校
spellingShingle Dushiau Tsai
蔡篤校
On Cheating in Visual Cryptography
author_sort Dushiau Tsai
title On Cheating in Visual Cryptography
title_short On Cheating in Visual Cryptography
title_full On Cheating in Visual Cryptography
title_fullStr On Cheating in Visual Cryptography
title_full_unstemmed On Cheating in Visual Cryptography
title_sort on cheating in visual cryptography
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/73127035023480845097
work_keys_str_mv AT dushiautsai oncheatinginvisualcryptography
AT càidǔxiào oncheatinginvisualcryptography
AT dushiautsai lùnshìjuémìmǎxuézhīqīpiànwèntíyǔfángyùjīzhì
AT càidǔxiào lùnshìjuémìmǎxuézhīqīpiànwèntíyǔfángyùjīzhì
_version_ 1717779510108094464