Cryptography Reference
In-Depth Information
We can explicitly solve equation (8.27) by multiplying with M
1
and get:
X
x
T
S
=
(1)
jTj+jSj+n+1
r
T
T
(8.28)
f1;:::;ngnSTf1;:::;ng
To verify equation (8.28) we can plug in the values of x
T
S
in equation (8.27).
The calculation is elementary and uses only the identity
(
1
(1)
i
n
i
X
for n = 0
=
for n > 0
:
0
i=0
In a solution of an extended visual cryptography scheme every x
T
S
must be
nonnegative. This leads to
X
(1)
jSj+jTj
r
T
T
0
(8.29)
STf1;:::;ng
for all possible subsetsTof P(f1;:::;ng)nf;g.
In left-hand side of inequality (8.29) we have the sum over rT
T
for jSj+jTj
even and over r
T
for jSj + jTj odd. This becomes maximal if all r
T
with
jSj+jTj even are as large as possible (i.e., equal h
T
) and all r
t
with jSj+jTj
odd are as small as possible (i.e., equal lT
T
).
Thus, an extended visual cryptography scheme exists if and only if
X
X
h
T
l
T
(8.30)
STf1;:::;ng
jSjjTj mod 2
STf1;:::;ng
jSj6jTj mod 2
holds for each S(f1;:::;ng.
The linear program given by equation (8.30) is very simple and can be
solved directly.
Theorem 19 ([13] Theorem 3.4) An extended visual cryptography scheme
with n transparencies needs at least
2
(3
n
1) subpixels. Hence, the construc-
tion of Theorem 17 is optimal with respect to the pixel expansion, i.e.,
1
1
2
(3
n
1) :
M(P(f1;:::;ng)nf;g) =
Proof
For each ; 6= T f1;:::;ng, let
T
= h
T
l
T
. Our goal is to prove that
equation (8.30) implies
X
T
2
jTj1
m h
f1;:::;ng
:
(8.31)
;6=Tf1;:::;ng
As the first step in this proof we show that, for given values
T
(for ; 6=
Search WWH ::
Custom Search