A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography

Visual cryptography (VC), first presented by Naor and Shamir, is a variant of secret sharing, thus it also called visual secret sharing. It can be widely used in many applications such as encrypting large data efficiently. In the literature, the problem of cheating is under consideration in secret sharing. Recently, Horng et al. pointed out that cheating is possible in k-out-of-n VC schemes, and presented two kinds of the cheating prevention schemes for protecting honest participants. One of them is the authentication based cheating prevention scheme. In this paper, we analyze the definition of cheating prevention and propose a new authentication based cheating prevention scheme. This scheme is constructed with Naor-Shamir's VC scheme. Finally, we give the security analysis to prove that the proposed scheme is immune to cheating.

[1]  G. Horng,et al.  Share Authentication based Cheating Prevention in Naor-Shamir ’ s Visual Cryptography , 2011 .

[2]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[3]  Gwoboa Horng,et al.  A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..

[4]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[5]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[6]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[7]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[8]  Ja-Chen Lin,et al.  Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion , 2010, J. Vis. Commun. Image Represent..

[9]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[10]  Alfredo De Santis,et al.  Cheating Immune Threshold Visual Secret Sharing , 2010, Comput. J..

[11]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[12]  Tzung-Her Chen,et al.  Visual secret sharing by random grids revisited , 2009, Pattern Recognit..

[13]  Gwoboa Horng,et al.  On the Security of a Cheating Immune Visual Secret Sharing Scheme , 2011, IACR Cryptol. ePrint Arch..

[14]  Moni Naor,et al.  Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[17]  Gwoboa Horng,et al.  Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.

[18]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).