Visual cryptographic protocols using the trusted initializer

  • Authors:
  • Hidenori Kuwakado;Masakatu Morii;Hatsukazu Tanaka

  • Affiliations:
  • Kobe University, Nada Kobe, Japan;Kobe University, Nada Kobe, Japan;Kobe Institute of Computing, Kobe, Japan

  • Venue:
  • ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show how to visualize an oblivious transfer and a commitment scheme with a method similar to that used in a visual secret sharing scheme. We call them a visual oblivious transfer and a visual commitment scheme, respectively. Data are images printed on transparencies, and the operation for obtaining information is only overlaying each of the transparencies over each other. Hence, it is easy for non-expert users to execute them. The visual oblivious transfer and the visual commitment scheme proposed in this paper are based on the trusted initializer model.