Cryptography Reference
In-Depth Information
`
0
= 1 and h
0
= 2, scheme S
0
has p
0
bjb
= 1=3 and p
0
bjw
= 0. As already said,
here we are considering values satisfying the condition `
0
= h
0
1. Notice that
for the values the case `
0
= 0 and h
0
= 2, some reconstructed pixels cannot
be classified as either black or white. In such a scheme the probabilities of
correctly reconstructing secret pixels are smaller (since some of the matrices
are wasted with a reconstruction that is neither black nor white). We also
remark that one could try to eliminate distribution matrices for which the
reconstruction gives a number of black subpixels in the gap between `
0
and
h
0
; however it is not clear whether this can be done without violating the
security property. In the particular case above, `
0
= 0 and h
0
= 2 is clearly
not possible (indeed we would have a perfect reconstruction of both white
and black). One could also extend the formal model to allow this possibility;
but then the contrast should be redefined in order to account for unclassified
reconstructed pixels.
The matrices M
B
and M
W
consisting of all the columns of C
B
and C
W
can
be used to represent the new scheme S
0
, since they give an ecient represen-
tation of the collections C
0
B
and C
0
W
; clearly together with M
B
and M
W
, the
pixel expansion m
0
and the thresholds `
0
and h
0
need to be specified.
Construction 1 starts from probabilistic schemes with no pixel expansion.
Using Lemma 3 or Lemma 4 a probabilistic scheme with no pixel expansion
can be obtained starting from a deterministic scheme. Hence, probabilistic
schemes with pixel expansion can be constructed by starting from a deter-
ministic scheme, applying first Lemma 3 and then Construction 1.
The probabilistic schemes obtained with Construction 1 satisfy the security
property. Indeed, consider a nonqualified set Q of participants and let C
W
(S)
(resp. C
B
(S)) be the vectors of C
W
(S) (resp. C
B
(S)) restricted to the rows
corresponding to participants in Q. By the security property of S, C
W
(S) and
C
B
(S) are the same collection of vectors. Since the way in which C
W
(S
0
) and
C
B
(S
0
) are constructed is the same (except that for the former we start from
C
W
(S) and for the latter from C
B
(S)), also C
W
(S
0
) and C
B
(S
0
) are the same
collection of matrices. Hence, the security property for S
0
holds.
In this section, a formula for the probabilities of the scheme built with
Construction 1 as a function of the probabilities of the starting scheme is
provided. Let S be a canonical probabilistic scheme with no pixel expansion
and let p
bjb
;p
bjw
;p
wjb
and p
wjw
be the probabilities of S.
Fix an m
0
and build a probabilistic scheme with pixel expansion m
0
using
Construction 1. Fix also a threshold `
0
, 0 `
0
< m
0
. Fixing `
0
also gives
h
0
= `
0
+ 1. Notice that, even with this restriction, not all choices of `
0
will
result in valid schemes. Let r be the cardinality of the collections C
W
and C
B
of S.
The cardinality of the collections C
0
W
and C
0
B
, of scheme S
0
, is r
0
= r(r
1) ::: (rm
0
+ 1) because the first column can be selected in r ways, the
second in r 1 ways, and so on until the last column for which r m
0
+ 1
Search WWH ::
Custom Search