1 / 17

論視覺密碼學之欺騙問題與防禦 機制 OnCheatinginVisualCryptography

論視覺密碼學之欺騙問題與防禦 機制 OnCheatinginVisualCryptography. 國立中興大學資訊科學研究所 指導教授 : 洪國寶 研究生 : 蔡篤校. 摘要.

Download Presentation

論視覺密碼學之欺騙問題與防禦 機制 OnCheatinginVisualCryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 論視覺密碼學之欺騙問題與防禦機制OnCheatinginVisualCryptography論視覺密碼學之欺騙問題與防禦機制OnCheatinginVisualCryptography 國立中興大學資訊科學研究所 指導教授: 洪國寶 研究生: 蔡篤校

  2. 摘要 祕密分享方法(secret sharing scheme)的概念,為一群參與者共同分享一個秘密(secret),其中唯有合法群組中的參與者,才可以共同合作求得秘密,而其它非法的群組並無法求得秘密。在祕密分享方法上,於1994 年,Noar與Shamir 兩位學者提出(k,n)門檻視覺密碼學,其特點為:分享給每一位參與者的資料(share)將會被轉印到投影片上,當有k 位以上(含)的參與者一起重疊k 張投影片時,無需任何運算,直接藉由人類視覺的幫助,就可以完成解碼的動作。 在本篇論文中,提出在視覺密碼學中,是否存在欺騙行為的問題,並且進一步以實驗證實了在多位參與者共謀的情況下,的確可能存在以下欺騙行為:共謀者可以欺騙其它誠實的參與者。由於欺騙行為於視覺密碼學的議題,在國內外尚未有廣泛的研究,且也未有明確的解釋,所以在文中明確定義出何謂欺騙行為,以作為進一步討論與研究的基礎,並在論文的最後提出兩個防範欺騙的機制,保護誠實的參與者。 關鍵詞:視覺密碼、欺騙問題、祕密分享、視覺認證

  3. Cheating

  4. (b)Share SA (64*192) (e) share SA and share SB (64*192) (c)Share SB (64*192) (f) share SB and share SC (64*192) (a)Secret message SM (64*64) (d)Share SC (64*192) (g) share SC and share SA (64*192)

  5. (b)Share SA' (64*192) (d)share SA' and share SC (64*192) (a)CM (64*64) (c)Share SB' (64*192) (e)share SB' and share SC (64*192)

  6. Cheating Protection SchemeⅠ 他的第一個防護措施是多做一份分享圖,但是多做的那一份並沒有要用,就類似(2,4)但是只有三個人拿到分享圖,多出來的第四份分享圖沒有用到,所以當某兩人要去騙第三人的時候,就要去猜第三人的點在哪裡,會有猜錯的時候,但也會有猜對的時候,所以是憑運氣,只是增加了失敗的機率。

  7. (b)Share SA (128*128) (d)Share SC (128*128) (a)Secret message SM (64*64) (c)Share SB (128*128) (e)Share SD (128*128)

  8. (f)share SA and share SB (128*128) (h)share SC and share SA (128*128) (g)share SB and share SC (128*128)

  9. (j)Share SA' (128*128) (i)Cheating message CM (64*64) (k)Share SB' (128*128)

  10. 這是有防護措施的所以會看不清楚 (l) share SB' and share SC (128*128) with cheating protection (m) share SC and share SA' (128*128) with cheating protection

  11. 這是沒有防護措施的所以會看的清楚 (n) share SB‘ and share SC without cheatingprotection (o) share SC and share SA' (128*128) without cheating protection

  12. Cheating Protection SchemeⅡ 他的第二個防護方法,製作分享圖的方法跟 防護方法一的一樣,但是它在這多加了一個 驗證的東西,所以每個人都會被分到兩張圖 ,一個機密分享圖,一個是驗證是否有欺騙 的驗證圖。

  13. (c) Verification share VA (a) Verification logo LA for Carol verifying Alice’s share (d) Verification share VB (b) Verification logo LB for Carol verifying Bob’s share (e) Verification share VC

  14. (f) Stacking SA and VC, LA is shown on the left-top corner (h) Stacking SA' and VC LA is not found (g) Stacking SB and VC, LB is shown on the right-top corner (i) Stacking SB' and VC, LB is not found

More Related