期刊文献+

一种改进的防欺骗可视密码方案 被引量:2

Improved visual cryptography scheme to prevent cheaters
下载PDF
导出
摘要 在VC(可视密码)的实际应用中分发者和参与者均可能存在欺骗行为,导致秘密图像无法正确恢复,基于此提出了一种改进的防欺骗可视密码方案。该方案用(2,n+1)-VCS(可视密码方案)代替(k,n)-VCS来分享验证图像,不需要引入传统的TTP(可信第三方),可同时直接验证分发者和参与者的欺骗行为,提高了可视密码方案的实用性与安全性。 Both dealer and participants were likely to cheat in the practical application of visual cryptography. In order to make sure that the secret image resuming was not impacted, this paper put forward an improved cheater detectable visual cryptography scheme. It used (2, n + 1 )-VCS instead of (k, n)-VCS to verify the cheating problems directly from both dealer and participants without introducing the trusted third party (TIP), and improved the security and practicability of visual cryptogra- phy scheme.
作者 张舒 李薇 艾小川 Zhang Shu Li Wei Ai Xiaochuan(Dept. of Mathematics, College of Science, Naval University of Engineering, Wuhan 430033, Chin)
出处 《计算机应用研究》 CSCD 北大核心 2016年第12期3770-3773,共4页 Application Research of Computers
基金 海军工程大学自然科学基金资助项目(HGDQNEQJJ15005)
关键词 欺骗者 可视密码 可信第三方 秘密分享 cheater visual cryptography(VC) trusted third party(TIP) secret sharing
  • 相关文献

参考文献4

二级参考文献32

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2郁滨,房礼国.外形比例不失真的可视门限方案的研究[J].计算机工程与设计,2006,27(11):1998-1999. 被引量:6
  • 3Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference, 1979, 48: 242-268.
  • 5Naor M and Shamir A. Visual cryptography. Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science, 1995, Vol.950: 1-12.
  • 6徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 7Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharing threshold visual cryptography [C]. CIS Workshops 2007, Harbin, 2007: 815-818.
  • 8Ateniese G, Blundo C, De Santis A, and Stinson D R. Visual cryptography for general access structures. Information and Computation, 1996, 129: 86-106.
  • 9Ateniese G, Blundo C, De Santis A, and Stinson D R. Extended capabilities for visual cryptography. Theoretical Computer Science, 2001, 250: 143-161.
  • 10NAOR M, SHAMIR A. Visual cryptography[ EB/OL]. [ 2008 - 10 -23 ]. http://people, csail, mit. edu/rivest/voting/papers/Naor-Shamir-VisualCryptography. ps .

共引文献21

同被引文献16

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部