Skip to main content

Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing

  • Conference paper
Information Systems Security (ICISS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8303))

Included in the following conference series:

  • 1016 Accesses

Abstract

In this paper, we study the problem of traitor-traceable key pre-distribution for general access structures. We propose a new scheme for key pre-distribution using visual secret sharing, where the keys are generated based on certain combinatorial block designs. Our scheme naturally extends for general access structures, and provides a flexible many-to-one function using visual secret sharing concepts to efficiently avoid the problem of pixel expansion. In addition, our proposal accommodates a simple traitor-tracing functionality for video broadcast applications; using efficient PBIBD based combinatorial constructs and visual secret sharing based on random grids. In effect, our scheme provides a novel technique for secure video and image broadcast, using general access structures to reduce collusions, trace forgery, and identify traitors in case there is a collusion. We duly analyze and discuss the efficiency of our scheme for varying number of users in the broadcast network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MATH  Google Scholar 

  2. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313–317. AFIPS Press (1979)

    Google Scholar 

  3. Chen, T.-H., Tsao, K.-H.: Visual secret sharing by random grids revisited. Pattern Recognition 42(9), 2203–2217 (2009)

    Article  MATH  Google Scholar 

  4. Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)

    Google Scholar 

  5. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  6. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  7. Ruj, S., Roy, B.K.: Key distribution schemes using combinatorial designs to identify all traitors. Congressus Numerantium 193, 195–214 (2008)

    MathSciNet  MATH  Google Scholar 

  8. Ruj, S., Roy, B.K.: Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. TOSN 6(1) (2009)

    Google Scholar 

  9. Ruj, S., Roy, B.K.: Key pre-distribution using partially balanced designs in wireless sensor networks. IJHPCN 7(1), 19–28 (2011)

    Article  Google Scholar 

  10. Safavi-Naini, R., Wang, Y.: A combinatorial approach to asymmetric traitor tracing. In: Du, D.-Z., Eades, P., Sharma, A.K., Lin, X., Estivill-Castro, V. (eds.) COCOON 2000. LNCS, vol. 1858, pp. 416–425. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Safavi-Naini, R., Wang, Y.: Sequential traitor tracing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 316–332. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  13. Stinson, D.R., Wei, R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J. Discrete Math. 11(1), 41–53 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  14. Street, A.P., Street, D.J.: Combinatorics of experimental design. Clarendon Press, Oxford University Press, Oxford, New York (1987)

    MATH  Google Scholar 

  15. Wu, X., Sun, W.: Visual secret sharing for general access structures by random grids. IET Information Security 6(4), 299–309 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, S., Jaipal, P.B.J., Sen Gupta, S., Ungrapalli, V.R. (2013). Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45204-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45203-1

  • Online ISBN: 978-3-642-45204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics