Cryptography Reference
In-Depth Information
Interpret the row vectors of M W and M B as incidence vectors of the sets
A i and B i .
The security requirement ((b) in Dention 1) says j S i2S A i j = j S i2S B i j
for all proper subsets S of f1;:::;ng. By the inclusion-exclusion formula this
is equivalent to j T i2S A i j = j T i2S B i j for all proper subsets S of f1;:::;ng.
By Theorem 3 we have
S i=1 B i S i=1 A i
S i=1 B i
2 1n :
=
Vice versa the incidence vectors of sets solving the approximated inclusion-
exclusion problem define a contrast optimal n-out-of-n visual cryptography
scheme. Note that 1= is also a lower bound for the pixel expansion m and
the example shows that this bound is sharp.
2
Using the proof technique of Theorem 3 one could also solve the approxi-
mate inclusion-exclusion problem for the case that only the size intersections
of up to n 2 sets are known.
Result 5 (see [12] Theorem 3.6) Let A 1 ;:::;A n and B 1 ;:::;B n be two
collections of sets satisfying
=
\
\
A i
B i
i2S
i2S
for all proper subsets S of f1;:::;ng with jSj n 2. Then
S i=1 A i
n 1
b n 2 c
1
S i=1 B i 1
:
The bound is sharp.
For the proof see [12]. At this point we show only the construction that
proves the sharpness.
We give for every subset S f1;:::;ng the size
:
\
A i n [
i2S
\
B i n [
i2S
A i
and
B i
i2S
i2S
The construction is best understood if we look at the example n = 9 first.
jSj
1
2
3
4
5
6
7
8
9
j T i2S A i n S i2S A i j 0
3
0
1
0
0
2
0
4
j T i2S B i n S i2S B i j 4
0
2
0
0
1
0
3
0
 
Search WWH ::




Custom Search