Cryptography Reference
In-Depth Information
Thus the collections A 0 i , B 0 i satisfy the induction hypothesis, i.e., we have
j S i=1 B 0 i j k2 n1 .
On the other hand, we have the collections A 0 i = A i \ A n+1 and B 0 i =
B i \B n+1 . Since
=
[
[
A i
B i
i=1
i=1
+
=
+
[
[
[
[
A 0 i
A 0 i
B 0 i
B 0 i
()
i=1
i=1
i=1
i=1
and j S i=1 A 0 i j+ k = j S i=1 B 0 i j we nd that the collections A 0 i and B 0 i satisfy
the induction hypothesis with j S i=1 B 0 i j + k = j S i=1 A 0 i j. Thus, jB n+1 j =
jA n+1 jj S i=1 A 0 i j k2 n1 . This proves
=
+ jB n+1 j k2 n1 + k2 n1 = k2 n
n+ [
[
B 0 i
B i
i=1
i=1
as desired.
To see that the bound is sharp consider the sets
A i = fS f1;:::;ngjjSj even;i 2 Sg
and
B i = fS f1;:::;ngjjSj odd;i 2 Sg :
Since for each nonempty set the number of subsets of even cardinality is the
same as the number subsets of odd cardinality (0 = (11) n = P j=0 (1) j j
)
we get
=
= 2 njSj1
\
\
A i
B i
i2S
i2S
for each proper subset S of f1;:::;ng. Hence, the sets A i and B i satisfies the
requirement conditions of the approximate inclusion-exclusion problem and
S i=1 B i S i=1 A i
2 n1 (2 n1 1)
2 n1
1
2 n1 ;
S i=1 B i
=
=
i.e., the bound given by the Theorem is sharp.
2
Theorem 3 translates directly to an contrast optimal n-out-of-n visual
cryptography scheme.
Theorem 4 (see [16]) The optimal contrast of a n-out-of-n visual cryptog-
raphy scheme is = 2 1n and the minimal pixel-expansion is m = 2 n1 .
Proof
By Lemma 1 a n-out-of-n visual cryptography scheme can be described by
two Boolean matrices M W and M B .
 
Search WWH ::




Custom Search