Skip to main content

Contrast-optimal k out of n secret sharing schemes in visual cryptography

Extended Abstract

  • Session 6: Cryptography and Computational Finance
  • Conference paper
  • First Online:
Computing and Combinatorics (COCOON 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1276))

Included in the following conference series:

Abstract

Visual cryptography and (k, n)-visual secret sharing schemes were introduced by Naor and Shamir in [NaSh1]. A sender wishing to transmit a secret message distributes n transparencies among n recipients, where the transparencies contain seemingly random pictures. A (k, n)-scheme achieves the following situation: If any k recipients stack their transparencies together, then a secret message is revealed visually. On the other hand, if only k - 1 recipients stack their transparencies, or analyze them by any other means, they are not able to obtain any information about the secret message.

The important measures of a scheme are its contrast, i.e., the clarity with which the message becomes visible, and the number of subpixels needed to encode one pixel of the original picture. Naor and Shamir constructed (k, k)-schemes with contrast 2−(k−1). By an intricate result from [LN2], they were also able to prove optimality. They also proved that for all fixed k ≤ n, there are (k, n)-schemes with contrast (2e)−k/√2πk - for k = 2, 3,4 the contrast is approx. 1/105, 1/698 and 1/4380.)

In this paper, we show that by solving a simple linear program, one is able to compute exactly the best contrast achievable in any (k, n)-scheme. The solution of the linear program also provides a representation of the corresponding scheme.

For small k as well as for k = n, we are able to analytically solve the linear program.

For k = 2, 3, 4, we obtain that the optimal contrast is at least 1/4,1/16 and 1/64.

For k = n, we obtain a very simple proof of the optimality of Naor's and Shamir's (k, k)-schemes.

In the case k = 2, we are able to use a different approach via coding theory which allows us to prove an optimal tradeoff between the contrast and the number of subpixels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson, Visual Cryptography for General Access Structures, Proc. of ICALP 96, Springer, 416–428, 1996.

    Google Scholar 

  2. S. Droste, New Results on Visual Cryptography, in “Advances in Cryptology”-CRYPTO '96, Springer, pp. 401–415, 1996.

    Google Scholar 

  3. R. Lidl, H. Niederreiter, Introduction to finite fields and their applications, Cambridge University Press, 1994.

    Google Scholar 

  4. N. Linial, N. Nisan, Approximate inclusion-exclusion, Combinatorica 10, 349–365, 1990.

    Google Scholar 

  5. J. H. van Lint, R. M. Wilson, A course in combinatorics, Cambridge University Press, 1996.

    Google Scholar 

  6. M. Naor, A. Shamir, Visual Cryptography, in “Advances in Cryptology-Eurocrypt 94”, Springer, 1–12, 1995.

    Google Scholar 

  7. M. Naor, A. Shamir, Visual Cryptography II: Improving the Contrast via the Cover Base, in Proc. of “Security protocols: international workshop 1996”, Springer LNCS 1189, 69–74, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tao Jiang D. T. Lee

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hofmeister, T., Krause, M., Simon, H.U. (1997). Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: Jiang, T., Lee, D.T. (eds) Computing and Combinatorics. COCOON 1997. Lecture Notes in Computer Science, vol 1276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0045084

Download citation

  • DOI: https://doi.org/10.1007/BFb0045084

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63357-0

  • Online ISBN: 978-3-540-69522-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics