{"created":"2023-05-15T11:03:59.500407+00:00","id":152,"links":{},"metadata":{"_buckets":{"deposit":"4c120c05-3b79-413c-96bf-838cba65402a"},"_deposit":{"created_by":15,"id":"152","owners":[15],"pid":{"revision_id":0,"type":"depid","value":"152"},"status":"published"},"_oai":{"id":"oai:u-aizu.repo.nii.ac.jp:00000152","sets":["5"]},"author_link":["53","54","55","56"],"control_number":"152","item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicPageEnd":"365","bibliographicPageStart":"356","bibliographicVolumeNumber":"13","bibliographic_titles":[{"bibliographic_title":"IEEE Transactions on Information Forensics and Security","bibliographic_titleLang":"en"}]}]},"item_10001_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"PDF","subitem_description_type":"Other"}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"The aim of this work is to maximize the range of the access control of visual secret sharing (VSS) schemes encrypting multiple images. First, the formulation of access structures for a single secret is generalized to that for multiple secrets. This generalization is maximal in the sense that the generalized formulation makes no restrictions on access structures; in particular,\nit includes the existing ones as special cases. Next, a sufficient condition to be satisfied by the encryption of VSS schemes\nrealizing an access structure for multiple secrets of the most general form is introduced, and two constructions of VSS schemes\nwith encryption satisfying this condition are provided. Each of the two constructions has its advantage against the other; one is\nmore general and can generate VSS schemes with strictly better contrast and pixel expansion than the other, while the other has a straightforward implementation. Moreover, for threshold access structures, the pixel expansions of VSS schemes generated by the latter construction are estimated and turn out to be the same as those of the existing schemes called the threshold multiple-secret visual cryptographic schemes (MVCS). Finally, the optimality of the former construction is examined, giving that there exist access structures for which it generates no optimal VSS schemes.","subitem_description_type":"Abstract"}]},"item_10001_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_10001_relation_14":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/TIFS.2017.2750104","subitem_relation_type_select":"DOI"}}]},"item_10001_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"The final version"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://dx.doi.org/10.1109/TIFS.2017.2750104","subitem_relation_type_select":"DOI"}}]},"item_10001_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"佐々木, 愛美","creatorNameLang":"ja"},{"creatorName":"ササキ, マナミ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"渡邊, 曜大","creatorNameLang":"ja"},{"creatorName":"ワタナベ, ヨウダイ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sasaki, Manami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Watanabe, Yodai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-05-16"}],"displaytype":"detail","filename":"VSS_TIFS.pdf","filesize":[{"value":"348.6 kB"}],"format":"application/pdf","licensetype":"license_11","mimetype":"application/pdf","url":{"label":"VSS_TIFS","url":"https://u-aizu.repo.nii.ac.jp/record/152/files/VSS_TIFS.pdf"},"version_id":"5b87b2a5-e51f-48de-8cc1-4727436659c5"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"視覚復号型秘密分散","subitem_subject_language":"ja"},{"subitem_subject":"一般アクセス構造","subitem_subject_language":"ja"},{"subitem_subject":"複数秘密情報","subitem_subject_language":"ja"},{"subitem_subject":"情報理論的安全性","subitem_subject_language":"ja"},{"subitem_subject":"Visual secret sharing","subitem_subject_language":"en"},{"subitem_subject":"General access structures","subitem_subject_language":"en"},{"subitem_subject":"Multiple secrets","subitem_subject_language":"en"},{"subitem_subject":"Information-theoretic security","subitem_subject_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article"}]},"item_title":"Visual secret sharing schemes encrypting multiple images","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Visual secret sharing schemes encrypting multiple images","subitem_title_language":"en"}]},"item_type_id":"10001","owner":"15","path":["5"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-05-16"},"publish_date":"2018-05-16","publish_status":"0","recid":"152","relation_version_is_last":true,"title":["Visual secret sharing schemes encrypting multiple images"],"weko_creator_id":"15","weko_shared_id":-1},"updated":"2023-09-25T09:09:01.363964+00:00"}