Cryptography Reference
In-Depth Information
In general we will have a zigzag line of numbers starting on the left side
in the B-row with the value b
n
2
c, going down to 1, then has one gap and
restart with 1. The general rule is as follows:
8
<
jSjd
2
e if jSj > n=2, and jSj is odd
d
2
ejSj if jSj < n=2, and jSj is even
0
=
\
A
i
n
[
i2S
A
i
(8.10)
:
i2S
in all other cases
8
<
jSjd
2
e if jSj > n=2, and jSj is even
d
2
ejSj if jSj < n=2, and jSj is odd
0
=
\
B
i
n
[
i2S
B
i
(8.11)
:
i2S
in all other cases
Some elementary combinatorial calculations ([12] Theorem 3.8) show that
this example satisfies Result 5 with equality.
Similar to Theorem 4 we can use Result 5 to prove that the contrast of
the optimal (n1)-out-of-n visual cryptography scheme satises
2
n
(
n1
b
n1
2
c
)
.
The example given above can be used to construct a scheme that satisfies the
bound with equality (see [12] Theorem 3.10).
8.4 Designs and Codes
2-out-of-n visual cryptography schemes are a very special case. In a symmetric,
contrast optimal scheme we encode a white pixel by giving all participants
the same share. For a black pixel we want to minimize the overlap of black
subpixels on the transparencies. This is a typical coding theory problem.
The link to coding theory becomes clear by comparing the following two
theorems and their proofs.
Theorem 6 (Plotkin bound) A binary code of length n with minimal dis-
tance d >
2
n has at most 2
j
d
k
codewords.
2dn
Proof
Let m be the number of codewords. Let A =
P
c6=c
0
d(c;c
0
) where the sum
ranges over all pairs of codewords. Since the code has minimal distance d the
sum is bounded below by
2
d.
Let m
i
be the number of codewords that have 1 in the ith column. The
contribution of those columns to the total distance A is mi)
i
(m m
i
)
bm=2cdm=2e.
Hence, bm=2cdm=2e A
2
m(m1)d. For d >
2
n this gives the bound
stated by the Theorem.
2
Search WWH ::
Custom Search