Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(<Special Section>Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, a method is proposed to construct a visual secret sharing (VSS) scheme for multiple secret images in which each share can be rotated with 180 degrees in decryption. The proposed VSS scheme can encrypt more number of secret images compared with the normal VSS schemes. Furthermore, the proposed technique can be applied to the VSS scheme that allows to turn over some shares in decryption. From the theoretical point of view, it is interesting to note that such VSS schemes cannot be obtained from so-called basis matrices straightforwardly.
- 社団法人電子情報通信学会の論文
- 2006-05-01
著者
-
米山 一樹
電気通信大学情報通信工学専攻
-
WANG Lei
University of Electro-Communications
-
OHTA Kazuo
University of Electro-Communications
-
Yoneyama Kazuki
Graduate School Of Electro-communications The University Of Electro-communications
-
Yoneyama Kazuki
Ntt Corporation
-
WANG Lei
School of Pharmacy P. O. Box 42, Shenyang Pharmaceutical University
-
Ohta Kazuo
Graduate School Of Electro-communications The University Of Electro-communications
-
IWAMOTO Mitsugu
Graduate School of Information Systems, University of Electro-Communications
-
KUNIHIRO Noboru
Graduate School of Electro-Communications, University of Electro-Communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
Yoneyama Kazuki
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Iwamoto Mitsugu
Univ. Electro‐communications
-
Iwamoto Mitsugu
Graduate School Of Information Systems University Of Electro-communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
関連論文
- A-7-29 パスワードベース認証付き鍵交換の安全性における(不)可能性(A-7. 情報セキュリティ,一般セッション)
- ハッシュリストの閲覧可能なランダムオラクルモデル(情報通信基礎サブソサイエティ合同研究会)
- 受信者の条件を秘匿したAttribute-Based Encryption
- Task-Structured PIOAフレームワークを用いた適応的攻撃者に対するDiffie-Hellman鍵交換の安全性解析(セキュリティ,フォーマルアプローチ論文)
- Secret Handshakeの安全性について(情報通信基礎サブソサイエティ合同研究会)
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- ハッシュリストの閲覧可能なランダムオラクルモデル(情報通信基礎サブソサイエティ合同研究会)
- ハッシュリストの閲覧可能なランダムオラクルモデル(情報通信基礎サブソサイエティ合同研究会)
- Toward the Fair Anonymous Signatures : Deniable Ring Signatures(Signatures,Cryptography and Information Security)
- Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
- Preimage Attack on 23-Step Tiger
- Secret Handshakeの安全性について(情報通信基礎サブソサイエティ合同研究会)
- Secret Handshakeの安全性について(情報通信基礎サブソサイエティ合同研究会)
- AS-3-3 非線形ランプ型秘密分散(招待講演,AS-3.情報ハイディングの理論と技術,シンポジウム)
- 分散画像の回転を許す一般アクセス構造に対して複数の画像を隠す視覚復号型秘密分散法
- 確率的メータリング法(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- 確率的メータリング法(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- 確率的メータリング法(ブロードバンドモバイル時代における基礎技術)(情報通信サブソサイエティ合同研究会)
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- Standard Deviation and Intra Prediction Mode Based Adaptive Spatial Error Concealment (SEC) in H.264/AVC
- Variable Block Size Motion Vector Retrieval Schemes for H.264 Inter Frame Error Concealment
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Universally composable client-to-client general authenticated key exchange (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Attribute-Based Encryption with Partially Hidden Ciphertext Policies
- On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
- Determination of Chlorogenic Acid in Rat Plasma by High Performance Chromatography after Peritoneal Administration of Compound Daqingye Injection
- Universally Composable Hierarchical Hybrid Authenticated Key Exchange(Protocols,Cryptography and Information Security)
- Round-Robin with VirtualClock Scheduling Algorithm in Multiservice Packet Networks(Network)
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Probabilistic Multi-Signature Schemes Using a One-Way Trapdoor Permutation(Discrete Mathematics and Its Applications)
- OAEP-ES : Methodology of Universal Padding Technique (Asymmetric Cipher) (Cryptography and Information Security)
- Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme(Application)(Cryptography and Information Security)
- Provably Secure Multisignatures in Formal Security Model and Their Optimality
- Taxonomical Security Consideration of OAEP Variants(Discrete Mathematics and Its Applications)
- Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison(Discrete Mathematics and Its Applications)
- Proxiable Designated Verifier Signature
- Preimage Attack on 23-Step Tiger
- Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures(Protocols,Cryptography and Information Security)
- Maurer-Yacobi ID-Based Key Distribution Revisited(Discrete Mathematics and Its Applications)
- Security of Cryptosystems Using Merkle-Damgard in the Random Oracle Model
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Efficient and Strongly Secure Password-based Server Aided Key Exchange
- Ring signatures: universally composable definitions and constructions (特集:情報システムを支えるコンピュータセキュリティ技術の再考)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Leaky Random Oracle
- FOREWORD
- Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
- Spectrofluorimetric Determination of Trace Amounts of Europium(III) Ion with Lutetium(III)-Sparfloxacin-Sodium Dodecyl Sulfate Luminescence Enhancement System
- How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- De-embedding of On-Chip Inductor at Millimeter-Wave Range
- Strongly Secure Predicate-Based Authenticated Key Exchange : Definition and Constructions
- Indifferentiable Security Reconsidered : Role of Scheduling
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
- Proxiable Designated Verifier Signature
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
- A New Type of Fault-Based Attack: Fault Behavior Analysis