dc.contributor.advisor |
Focardi, Riccardo |
it_IT |
dc.contributor.author |
Moretto, Tommaso <1992> |
it_IT |
dc.date.accessioned |
2018-06-20 |
it_IT |
dc.date.accessioned |
2018-12-03T06:21:54Z |
|
dc.date.available |
2018-12-03T06:21:54Z |
|
dc.date.issued |
2018-07-11 |
it_IT |
dc.identifier.uri |
http://hdl.handle.net/10579/13391 |
|
dc.description.abstract |
In this thesis we investigate the application of visual cryptography to enforce 2D barcode confidentiality. The approach of visual cryptography is appealing because 2D barcodes are indeed images, but it presents non-trivial challenges. First of all, visual cryptography aims at sharing a unique secret between two or more participants while here we would like to provide each participant with a visual decryption key that can be used to recover the participant's distinguished secret; moreover, visual cryptography assumes that images are pre-shared among participants which is not practical in many situations. We contribute to the state-of-the-art by implementing and experimenting with two extensions to visual cryptography proposed together with the colleague Nicolò Ghiotto. The first scheme allows for generating a single visual ciphertext that can be decrypted by each participant’s visual key, giving a different (plaintext) 2D barcode. This scheme presents a practical limitation: the visual key is a random image that is very hard to scan and needs to be pre-shared. The second scheme extends the first one by permitting to derive the visual key from a password using what we call a visual key derivation function. This removes the limitation of the first scheme but introduces a scalability issue for what concerns the number of participants. We present experiments and discuss limitations with respect to real use cases. |
it_IT |
dc.language.iso |
en |
it_IT |
dc.publisher |
Università Ca' Foscari Venezia |
it_IT |
dc.rights |
© Tommaso Moretto, 2018 |
it_IT |
dc.title |
Secure 2D barcodes based on visual cryptography |
it_IT |
dc.title.alternative |
Secure 2D barcodes based on visual cryptography |
it_IT |
dc.type |
Master's Degree Thesis |
it_IT |
dc.degree.name |
Informatica - computer science |
it_IT |
dc.degree.level |
Laurea magistrale |
it_IT |
dc.degree.grantor |
Dipartimento di Scienze Ambientali, Informatica e Statistica |
it_IT |
dc.description.academicyear |
2017/2018, sessione estiva |
it_IT |
dc.rights.accessrights |
openAccess |
it_IT |
dc.thesis.matricno |
844996 |
it_IT |
dc.subject.miur |
INF/01 INFORMATICA |
it_IT |
dc.description.note |
|
it_IT |
dc.degree.discipline |
|
it_IT |
dc.contributor.co-advisor |
|
it_IT |
dc.date.embargoend |
|
it_IT |
dc.provenance.upload |
Tommaso Moretto (844996@stud.unive.it), 2018-06-20 |
it_IT |
dc.provenance.plagiarycheck |
Riccardo Focardi (focardi@unive.it), 2018-07-02 |
it_IT |