3.1. The Definition of (t, s, k, n)-EVCS
In traditional (
k,
n)-VCS, a qualified subset of participants should have any
k or more participants. The roles of each participant are the same. However, there are many examples in practical situations where some participants are given privileges because of their status or importance, such as heads of government, company managers, etc. Therefore, it is reasonable for us to consider giving special powers to some participants in VCS. The proposed (
t,
s,
k,
n)-EVCS shares the secret image into
n shadows with
s essentials and
n-
s non-essentials. Stacking any
k shadows, including at least
t essential one, can reveal the secret image. A qualified subset of participants should have at least
k shadows, including
t essentials. Let
EP = {1, 2, …,
s} and
NEP = {
s + 1,
s + 2, …,
n} denote the set of essential participants and non-essential participants, respectively. Subsequently, we can derive all qualified sets
of (
t,
s,
k,
n)-EVCS, as follows.
If a subset of participant does not belong to the qualified sets
, it belongs to forbidden sets. Hence, we have forbidden sets
of (
t,
s,
k,
n)-EVCS.
Subsequently, (t, s, k, n)-EVCS can be defined if and only if the access structure satisfies Equations (3) and (4).
We only consider non-trivial EVCS, which cannot be reduced to a threshold VCS. For the relationships among t, s, k, and n of (t, s, k, n)-EVCS, we have the following facts.
- (1)
t, s, k and n are all integers no less than 1, and , .
- (2)
k > t. Otherwise, (t, s, k, n)-EVCS is reduced to (t, s)-VCS.
- (3)
k < n. Otherwise, (t, s, k, n)-EVCS is reduced to (n, n)-VCS.
- (4)
If s = n, (t, s, k, n)-EVCS is reduced to (t, n)-VCS. Hence, s < n. If s = n − 1, then there is only one non-essential participant. A qualified set of participants contains k members, including at least t essentials and k - t non-essentials. We have k – t ≤ 1. Since k > t, then k = t + 1. If s = t, then k = s + 1 = n, and (t, s, k, n)-EVCS is reduced to (n, n)-VCS. Otherwise, , which means that there are more than t essentials. Since there is only one non-essential participant, any t + 1 participants must contain at least t essentials and they can reveal the secret image. Afterwards, (t, s, k, n)-EVCS is reduced to (t + 1, n)-VCS. Overall, we have s ≤ n-2.
- (5)
. The number of non-essentials is , and the largest number of non-essentials in a qualified set is . Obviously, . If , then any k participants will contain at least essentials. Subsequently, (t, s, k, n)-EVCS is reduced to (k, n)-VCS. Therefore, we have .
Finally, we have the relationships among
t,
s,
k and
n of (
t,
s,
k,
n)-EVCS are shown, as follows:
3.2. Constructing (t, s, k, n)-EVCS Based on Integer Programming
The idea for constructing (
t,
s,
k,
n)-EVCS is that we generate the shadows by a monotonic (
K,
N)-VCS. The secret image is first shared into
N shadows by (
K,
N)-VCS. Subsequently, each essential (non-essential) shadow of EVCS is obtained by the superposition of
(
) shadows of VCS. Obviously, we have
Since essential shadow is more important than the non-essential shadow of EVCS, must be larger than .
Figure 3 shows the diagram of generating shadows of EVCS by the shadows of a monotonic VCS.
For (K, N)-VCS, a qualified subset of shadows should have at least K shadows. Each essential (non-essential) shadow of EVCS represents the stacking result of () shadows of (K, N)-VCS. A qualified subset of shadows of EVCS should contribute no less than K shadows of (K, N)-VCS to satisfy the contrast condition of (K, N)-VCS. Any forbidden subset of shadows of EVCS should contribute less than K shadows of (K, N)-VCS to satisfy the security condition of (K, N)-VCS. Therefore, our task is determining the proper values of , , K, and N to be used for constructing (t, s, k, n)-EVCS. In this paper, we get the values of , , K, and N by solving an integer programming model.
For (t, s, k, n)-EVCS, we first need to build the relationship among the values of , , K, and N. These parameters should satisfy the following conditions.
- (1)
For all parameters , , K, and N to make sense, we need to restrict that , , , and .
- (2)
Essential shadows are more important than non-essential shadows. In another word, an essential shadow can contribute more shadows of VCS than a non-essential shadow. Hence,
must be larger than
. That is
- (3)
By Equation (3), we have that a qualified set should contain any
k shadows, including at least
t essentials. In another word,
k shadows of EVCS, including
t essential ones, can contribute at least
K shadows of VCS. Subsequently, we have
Obviously, Equation (8) guarantees that any k shadows of EVCS, including more than t essential ones, can also contribute at least K shadows of VCS.
- (4)
By Equations (3) and (4), the secret image cannot be recovered with less than
t essential shadows. In another word, the threshold value
K of (
K,
N)-VCS is still not satisfied, even if
t−1 essential shadows and all
n-
s non-essential shadows are gathered. Subsequently, we have the following inequality.
- (5)
By Equations (3) and (4), the secret image cannot be recovered with less than k shadows.
If
, then any
k−1 essential shadows cannot contribute enough shadows of VCS. In order to satisfy the security condition of VCS, we have
If
s <
k, then any
s essential shadows and
k-
s − 1 non-essential shadows cannot contribute enough shadows of VCS. To satisfy the security condition of VCS, we have
For (
K,
N)-VCS, the larger values of
K and
N may reduce the visual quality of the revealed image, and complicate the sharing process. Therefore, we want to obtain as small values of
K and
N as possible. In general, the objective function is:
We generate the following integer programming models (IPM) by combining the constraint conditions and objective function.
(IPM I): When
, the corresponding integer programming model is:
(IPM II): When
, the corresponding integer programming model is:
3.3. Determine the Parameters by Solving IPMs
We need to solve IPM I or IPM II to determine the values of
,
,
K and
N. Before we solve IPM, we divide the relationship among
t,
s and
k into six cases: (Case 1)
,
; (Case 2)
,
; (Case 3)
,
; (Case 4)
,
; (Case 5)
,
; (Case 6)
,
.
Figure 4 shows the diagram of the division for different cases. For Case 1 and Case 2, we need to solve IPM I. For the other cases, we need to solve IPM II.
Now we solve IPM according to the six cases, respectively.
(Case 1) t = s, s < k.
For this case, we need to solve IPM I. First, we convert IPM I into standard form by generalizing the sighs of
,
and
K to
,
, and
. Subsequently, we have new IPM as follows.
where
,
,
,
,
,
, and
are non-negative residual variables (slack variables). We use the dual simplex method to solve above IPM. Equation (15) is converted to the following form to obtain the initial feasible basis of the dual problem.
Establish the initial simplex table for IPM, as shown in
Table 1.
From
Table 1 it can be seen that the solution of the dual problem corresponding to the row of checking number is feasible. Since some numbers in column b is negative, iterative operation is required. Since the values of
are equal, the non-basic variable with the smallest subscript in
XB is selected as the leaving variable, i.e.
. Check the coefficients
of the row of
in the simplex table, if all
, there is no feasible solution, and the calculation is terminated. If
, calculate
, and the non-basic variable
of the column corresponding to rule of
is the entering variable. Calculating according to the above steps, we obtain
, so
is the entering variable. “−1” is the pivot element at the intersection of the column and row where the variables are entering and leaving. The iteration is performed according to the calculation steps of dual simplex method, and
Table 2 shows the results.
From
Table 2 it can be seen that the dual problem is still a feasible solution, and there are still negative components in column
b. Repeat the above iterative steps until the numbers in column
b are all non-negative and the test numbers are all non-positive, as shown in
Table 3.
The numbers in column
b are all non-negative and the test numbers are all non-positive, as shown in
Table 3. Therefore, the optimal solution of the problem is X
* = (
, 1,
,0,0,0, ,
,0,). Additionally, since
, then
. From what has been discussed above, any (
t,
t,
k,
n)-EVCS can be constructed by a monotonic (
K,
N)-VCS = (
,
)-VCS with
=
and
= 1.
(Case 2) t ≠ s, s < k.
For this case, we need to solve IPM I with the same method.
Table 4 shows the simplex table obtained after two iterations.
Since , with the relationship between s and t, we have . Subsequently, the linear programming has a solution if and only if . Continue to iterate. It is calculated that the elements in column b are , , , , , , , respectively. They are obviously all non-negative, except , which needs further discussion. If , i.e. , then the calculation is terminated. It can be known from conditions and that , namely, . Thus, the above simplex table can be simplified into the following table.
The elements in column
b are all non-negative and the checking numbers are all non-positive, as shown in
Table 5. Therefore, the optimal solution of the problem is X
* = (
,
,
,0,0,0,0,
, and
,
). From what has been discussed above, (
t,
s,
k,
n)-EVCS of Case 2 can be constructed by a monotonic (
K,
N)-VCS = (
,
)-VCS with
=
and
=
. If
, we have known that
, then
, the absence of
t,
s,
k, and
n makes this condition satisfy.
(Case 3) s – t = 1, s = k.
For this case, we need to solve IPM II with the same method.
Table 6 shows the simplex table obtained after three iterations.
If , i.e. , then the calculation is terminated and we have (K, N)-VCS = (, )-VCS with = n−s and = 1. Otherwise, does not satisfy the conditions that are given in Equation (5).
Similarly, for Case 4, Case 5, and Case 6, the same analysis method is used to solve the corresponding IPM. Finally, we have the solutions of the corresponding IPM with different conditions. as shown in
Table 7.
From
Table 7, for the most cases, we can find the solutions (
,
,
K) of the corresponding IPM. Since
N can be calculated by Equation (6), we can construct (
t,
s,
k,
n)-EVCS by the corresponding monotonic (
K,
N)-VCS. For some common cases of (
t,
s,
k,
n)-EVCS, we list the solutions of the corresponding IPM, the values of
,
,
K, and
N in
Table 8.