Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography

被引:2
作者
D'Arco, Paolo [1 ]
De Prisco, Roberto [1 ]
Desmedt, Yvo [2 ]
机构
[1] Univ Salerno, Dipartimento Informat, Via Giovanni Paolo II, I-84084 Fisciano, SA, Italy
[2] Univ Texas Dallas, Dept Comp Sci, 800 W Campbell Rd, Richardson, TX 75080 USA
来源
INFORMATION THEORETIC SECURITY, ICITS 2016 | 2016年 / 10015卷
关键词
Information theory; Visual cryptography; Secure computation; Unconditional privacy; SCHEMES;
D O I
10.1007/978-3-319-49175-2_5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure computation through non standard methods, suitable for users who have to perform the computation without the aid of a computer, or for settings in which the degree of trustworthiness of the hardware and software equipments is very low, are an interesting, very challenging and quite unexplored research topic. In this paper we put forward a collection of ideas and some techniques which could be useful in order to make some progress in designing protocols with such properties. Our contribution is twofold: we explore the power of visual cryptography as a computing tool, exploiting alternative uses and share manipulations, and we address the central issue of randomness reduction in visual schemes, by showing a strict relation with existing results in secure multiparty computation. More specifically, we prove that: by properly defining operations on the shares, we show that visual shares are homomorphic with respect to some functions f. More precisely, in the two-party case, each user, by applying to his two shares a(i), b(i) of the secrets a, b the operation, gets a share g(i)(a(i), b(i)), i = 1, 2, such that the superposition of g(1)(a(1), b(1)) and g(2)(a(2), b(2)) visually provides, applying the standard Naor and Shamir superposition reconstruction strategy, the value of the function f; we link our analysis to a general known result on private two-party computation, and we classify all the boolean functions of two input bits which admit homomorphic visual share computation; we prove that by encoding pixels in groups, instead of encoding each pixel independently, and exploiting dependencies, some randomness can be saved if and only if the pixel dependencies can be expressed through some specific boolean functions. For example, given three pixels, if the third one is the and or the or of the first two, randomness reduction is impossible, while if it is the xor of the first two, randomness reduction can be achieved.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 17 条
[1]  
[Anonymous], INT BUSINESS TIMES
[2]  
Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
[3]  
Ben-Or M., 1988, P STOC
[4]  
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[5]  
CHAUM D, SECRET BALLOT RECEIP
[6]  
Chaum D., 1988, P STOC
[7]   Probabilistic visual cryptography schemes [J].
Cimato, S ;
De Prisco, R ;
De Santis, A .
COMPUTER JOURNAL, 2006, 49 (01) :97-107
[8]  
Cimato S, 2012, DIGIT IMAG COMPUT, P1
[9]   Secure Two-Party Computation: A Visual Way [J].
D'Arco, Paolo ;
De Prisco, Roberto .
INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 :18-38
[10]   Randomness in secret sharing and visual cryptography schemes [J].
De Bonis, A ;
De Santis, A .
THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) :351-374