Abstract
Visual cryptography and (k, n)-visual secret sharing schemes were introduced by Naor and Shamir in [NaSh1]. A sender wishing to transmit a secret message distributes n transparencies among n recipients, where the transparencies contain seemingly random pictures. A (k, n)-scheme achieves the following situation: If any k recipients stack their transparencies together, then a secret message is revealed visually. On the other hand, if only k - 1 recipients stack their transparencies, or analyze them by any other means, they are not able to obtain any information about the secret message.
The important measures of a scheme are its contrast, i.e., the clarity with which the message becomes visible, and the number of subpixels needed to encode one pixel of the original picture. Naor and Shamir constructed (k, k)-schemes with contrast 2−(k−1). By an intricate result from [LN2], they were also able to prove optimality. They also proved that for all fixed k ≤ n, there are (k, n)-schemes with contrast (2e)−k/√2πk - for k = 2, 3,4 the contrast is approx. 1/105, 1/698 and 1/4380.)
In this paper, we show that by solving a simple linear program, one is able to compute exactly the best contrast achievable in any (k, n)-scheme. The solution of the linear program also provides a representation of the corresponding scheme.
For small k as well as for k = n, we are able to analytically solve the linear program.
For k = 2, 3, 4, we obtain that the optimal contrast is at least 1/4,1/16 and 1/64.
For k = n, we obtain a very simple proof of the optimality of Naor's and Shamir's (k, k)-schemes.
In the case k = 2, we are able to use a different approach via coding theory which allows us to prove an optimal tradeoff between the contrast and the number of subpixels.
Preview
Unable to display preview. Download preview PDF.
References
G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson, Visual Cryptography for General Access Structures, Proc. of ICALP 96, Springer, 416–428, 1996.
S. Droste, New Results on Visual Cryptography, in “Advances in Cryptology”-CRYPTO '96, Springer, pp. 401–415, 1996.
R. Lidl, H. Niederreiter, Introduction to finite fields and their applications, Cambridge University Press, 1994.
N. Linial, N. Nisan, Approximate inclusion-exclusion, Combinatorica 10, 349–365, 1990.
J. H. van Lint, R. M. Wilson, A course in combinatorics, Cambridge University Press, 1996.
M. Naor, A. Shamir, Visual Cryptography, in “Advances in Cryptology-Eurocrypt 94”, Springer, 1–12, 1995.
M. Naor, A. Shamir, Visual Cryptography II: Improving the Contrast via the Cover Base, in Proc. of “Security protocols: international workshop 1996”, Springer LNCS 1189, 69–74, 1997.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hofmeister, T., Krause, M., Simon, H.U. (1997). Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: Jiang, T., Lee, D.T. (eds) Computing and Combinatorics. COCOON 1997. Lecture Notes in Computer Science, vol 1276. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0045084
Download citation
DOI: https://doi.org/10.1007/BFb0045084
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63357-0
Online ISBN: 978-3-540-69522-6
eBook Packages: Springer Book Archive