Abstract
In this paper we present a new k out of n visual cryptography scheme which does not only meet the requirements of a basic visual cryptography scheme defined by Naor and Shamir [5] but is also traceable. A k out of n visual cryptography scheme is a special instance of a k out of n threshold secret sharing scheme [6]. Thus, no information about the original secret can be revealed if less than k share-holders combine their shares. In those systems it is inherently assumed that even if there are k or more share-holders with an interest in the abuse of the secret, then it is almost impossible that they can meet up as an entirety (e.g. because they are to cautious to inform too many others about their intentions) and combine their shares to misuse the secret. But in real scenarios it might not be too unlikely that the betrayers find together in small groups. Even though each one of these groups is too small to compute the original secret, the betrayers of such a group can impose a major security risk on the system by publishing the information about their shares. Suppose for example that k − 1 betrayers find each other and do the publishing. Then all the other n − k + 1 share-holders can potentially reveal the secret without ever meeting up with at least k − 1 other share-holders as is intended by the system. In order to cope with this lack of security, we present in this paper the idea of traceable visual cryptography schemes which allows to track down the publishing saboteurs.
This research was done while the author was a member of the Graduiertenkolleg Informatik at the University of Saarbruecken, a fellowship program of the DFG (Deutsche Forschungsgemeinschaft).
Preview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Blundo, C., De Santis, A., and Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation, Vol. 129, No. 2, pp. 86–106, 1996 and ECCC, Electronic Colloquium on Computational Complexity (TR96-012).
Ateniese, G., Blundo, C., De Santis, A., and Stinson, D.R.: Constructions and Bounds for Visual Cryptography. Proc. 23rd International Colloquium on Automata, Languages and Programming (ICALP '96), Springer Lecture Notes in Computer Science, 1996.
Carter, J.L., and Wegman, M.N.: Universal Classes of Hash Functions. Journal of Computer and System Sciences 18, pp 143–154, 1979.
Droste, S.: New Results on Visual Cryptography. Proc. CRYPTO '96, Springer Lecture Notes in Computer Science, pp. 401–415, 1996.
Naor, M., and Shamir, A.: Visual Cryptography. Proc. EUROCRYPT '94, Springer Lecture Notes in Computer Science, pp. 1–12, 1995.
Shamir, A.: How to Share a Secret. Comm. of the ACM, Vol. 24, No. 11, pp. 118–129, 1979.
Wegman, M.N., and Carter, J.L.: New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences 22, pp 265–279, 1981.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Biehl, I., Wetzel, S. (1997). Traceable visual cryptography. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028462
Download citation
DOI: https://doi.org/10.1007/BFb0028462
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive