Skip to main content

Traceable visual cryptography

Extended abstract

  • Session 2: Secret Sharing
  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Abstract

In this paper we present a new k out of n visual cryptography scheme which does not only meet the requirements of a basic visual cryptography scheme defined by Naor and Shamir [5] but is also traceable. A k out of n visual cryptography scheme is a special instance of a k out of n threshold secret sharing scheme [6]. Thus, no information about the original secret can be revealed if less than k share-holders combine their shares. In those systems it is inherently assumed that even if there are k or more share-holders with an interest in the abuse of the secret, then it is almost impossible that they can meet up as an entirety (e.g. because they are to cautious to inform too many others about their intentions) and combine their shares to misuse the secret. But in real scenarios it might not be too unlikely that the betrayers find together in small groups. Even though each one of these groups is too small to compute the original secret, the betrayers of such a group can impose a major security risk on the system by publishing the information about their shares. Suppose for example that k − 1 betrayers find each other and do the publishing. Then all the other nk + 1 share-holders can potentially reveal the secret without ever meeting up with at least k − 1 other share-holders as is intended by the system. In order to cope with this lack of security, we present in this paper the idea of traceable visual cryptography schemes which allows to track down the publishing saboteurs.

This research was done while the author was a member of the Graduiertenkolleg Informatik at the University of Saarbruecken, a fellowship program of the DFG (Deutsche Forschungsgemeinschaft).

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., De Santis, A., and Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation, Vol. 129, No. 2, pp. 86–106, 1996 and ECCC, Electronic Colloquium on Computational Complexity (TR96-012).

    Article  Google Scholar 

  2. Ateniese, G., Blundo, C., De Santis, A., and Stinson, D.R.: Constructions and Bounds for Visual Cryptography. Proc. 23rd International Colloquium on Automata, Languages and Programming (ICALP '96), Springer Lecture Notes in Computer Science, 1996.

    Google Scholar 

  3. Carter, J.L., and Wegman, M.N.: Universal Classes of Hash Functions. Journal of Computer and System Sciences 18, pp 143–154, 1979.

    Article  Google Scholar 

  4. Droste, S.: New Results on Visual Cryptography. Proc. CRYPTO '96, Springer Lecture Notes in Computer Science, pp. 401–415, 1996.

    Google Scholar 

  5. Naor, M., and Shamir, A.: Visual Cryptography. Proc. EUROCRYPT '94, Springer Lecture Notes in Computer Science, pp. 1–12, 1995.

    Google Scholar 

  6. Shamir, A.: How to Share a Secret. Comm. of the ACM, Vol. 24, No. 11, pp. 118–129, 1979.

    Google Scholar 

  7. Wegman, M.N., and Carter, J.L.: New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences 22, pp 265–279, 1981.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Biehl, I., Wetzel, S. (1997). Traceable visual cryptography. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028462

Download citation

  • DOI: https://doi.org/10.1007/BFb0028462

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics