Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor

Journal Description

Cryptography.

  • Open Access — free for readers, with article processing charges (APC) paid by authors or their institutions.
  • High Visibility:  indexed within Scopus , ESCI (Web of Science) , dblp , and  other databases .
  • Journal Rank:  JCR - Q2 ( Computer Science, Theory and Methods ) / CiteScore - Q1 ( Applied Mathematics )
  • Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 23.9 days after submission; acceptance to publication is undertaken in 3.7 days (median values for papers published in this journal in the first half of 2024).
  • Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.

Latest Articles

research paper cryptography

Journal Menu

  • Cryptography Home
  • Aims & Scope
  • Editorial Board
  • Reviewer Board
  • Instructions for Authors

Special Issues

  • Sections & Collections
  • Article Processing Charge
  • Indexing & Archiving
  • Most Cited & Viewed
  • Journal Statistics
  • Journal History
  • Editorial Office

Journal Browser

  • arrow_forward_ios Forthcoming issue arrow_forward_ios Current issue
  • Vol. 8 (2024)
  • Vol. 7 (2023)
  • Vol. 6 (2022)
  • Vol. 5 (2021)
  • Vol. 4 (2020)
  • Vol. 3 (2019)
  • Vol. 2 (2018)
  • Vol. 1 (2017)

Highly Accessed Articles

Latest books, e-mail alert.

research paper cryptography

Conferences

Topical collections, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

An overview of visual cryptography techniques

  • Published: 21 July 2021
  • Volume 80 , pages 31927–31952, ( 2021 )

Cite this article

research paper cryptography

  • Dyala R. Ibrahim 1 ,
  • Je Sen Teh   ORCID: orcid.org/0000-0001-5571-4148 2 &
  • Rosni Abdullah   ORCID: orcid.org/0000-0002-3061-5837 1  

2061 Accesses

30 Citations

1 Altmetric

Explore all metrics

Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research paper cryptography

Similar content being viewed by others

research paper cryptography

Feature and Future of Visual Cryptography Based Schemes

research paper cryptography

Visual Cryptography: An Emerging Technology

research paper cryptography

Color Image Visual Cryptography Scheme with Enhanced Security

Explore related subjects.

  • Artificial Intelligence

as of mid-January 2021

A JB, Raj C, Sukumaran R, G SM (2019) Enhanced semantic visual secret sharing scheme for the secure image communication. 79(23-24), 17057–17079. https://doi.org/10.1007/s11042-019-7535-2

Abraham AS, Nair LR, Deepa MS (2017) A novel method for evaluation of visual security of images. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT). IEEE

Al-Khalid RI, Al-Dallah RA, Al-Anani AM, Barham RM, Hajir SI (2017) A secure visual cryptography scheme using private key with invariant share sizes. J Softw Eng Appl 10(01):1–10. https://doi.org/10.4236/jsea.2017.101001

Article   Google Scholar  

Alex NS, Anbarasi LJ (2011) Enhanced image secret sharing via error diffusion in halftone visual cryptography. In: 2011 3rd International Conference on Electronics Computer Technology. IEEE

Amitharaja R, Shaik A, Thanikaise V (2016) Data security through data hiding in images: A review. J Artif Intell 10(1):1–21. https://doi.org/10.3923/jai.2017.1.21

Arumugam S, Lakshmanan R, Nagar AK (2012) On (k, n)∗-visual cryptography scheme. 71(1), 153–162. https://doi.org/10.1007/s10623-012-9722-2

Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images. In: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE

Askari N, Heys HM, Moloney CR (2014) Novel visual cryptography schemes without pixel expansion for halftone images. Can J Electr Comput Eng 37(3):168–177. https://doi.org/10.1109/cjece.2014.2333419

Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106. https://doi.org/10.1006/inco.1996.0076

Article   MathSciNet   MATH   Google Scholar  

Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):143–161. https://doi.org/10.1016/s0304-3975(99)00127-9

Bhatnagar R, Kumar M (2018) Visual Cryptography: A literature survey. In: 2018 Second INternational Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE

Blesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. In: 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEE

Bonis AD, Santis AD (2004) Randomness in secret sharing and visual cryptography schemes. Theor Comput Sci 314(3):351–374. https://doi.org/10.1016/j.tcs.2003.12.018

Borchert B (2007) Segment-based Visual Cryptography. Tech. Rep. WSI-2007-04, WSI Institute for computer science

Chanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval 8(4):195–215. https://doi.org/10.1007/s13735-018-0161-3

Chao HC, Fan TY (2017) Generating random grid-based visual secret sharing with multi-level encoding. Signal Process Image Commun 57:60–67. https://doi.org/10.1016/j.image.2017.05.005

Chao H-C, Fan T-Y (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing 68:69–80. https://doi.org/10.1016/j.dsp.2017.05.009

Chaturvedi A, Bhat IJ (2015) Analysis of schemes proposed for improving the segment based visual cryptography. International Journal of Computer Trends and Technology 30(1):26–30. https://doi.org/10.14445/22312803/ijctt-v30p105

Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE). IEEE

Chavan PV, Atique M (2015) Secured approach for authentication using threshold-based hierarchical visual cryptography. International Journal of Information Privacy, Security and Integrity 2(2):159. https://doi.org/10.1504/ijipsi.2015.075440

Chavan PV, Atique M, Malik L (2014) Signature based authentication using contrast enhanced hierarchical visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE

Chen J, Chen T-S, Hsu H-C, Lin Y-H (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. The Imaging Science Journal 57(2):101–108. https://doi.org/10.1179/174313108x384656

Chen Q, Peng W-F, Zhang M, Chu Y-P (2010) An (n, n) threshold visual cryptography scheme for cheating prevention. In: 2010 3rd International Conference on Computer Science and Information Technology. IEEE

Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. 8, 111330–111346. https://doi.org/10.1109/access.2020.3000308

Dahat AV, Chavan PV (2016) Secret sharing based visual cryptography scheme us-ing cmy color space. Procedia Computer Science 78:550–555. https://doi.org/10.1016/j.procs.2016.02.101

Das SS, Sharma KD, Chandra JK, Bera JN (2018) A hierarchical image cryptosystem based on visual cryptography and vector quantization. In: Advances in Intelligent Systems and Computing, pp 3–11. Springer Singapore

Deepa AK, Bento B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 2014 12th International Conference on Signal Processing (ICSP). IEEE

Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Computers & Electrical Engineering 70:647–658. https://doi.org/10.1016/j.compeleceng.2017.09.017

Fang W-P (2008) Friendly progressive visual secret sharing. Pattern Recogn 41(4):1410–1414. https://doi.org/10.1016/j.patcog.2007.09.004

Article   MATH   Google Scholar  

Fathimal M, Jansirani (2019) New fool proof examination system through color visual cryptography and signature authentication. In: The International Arab Journal of In-formation Technology, pp 322–336. Springer Berlin Heidelberg

Feng J-B, Wu H-C, Tsai C-S, Chang Y-F, Chu Y-P (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581. https://doi.org/10.1016/j.patcog.2008.05.031

Fu Z, Yu B (2009) Research on rotation visual cryptography scheme. In: 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE

Geetha P, Jayanthi VS, Jayanthi AN (2019) Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. 78(13), 18503–18530. https://doi.org/10.1007/s11042-019-7163-x

Guo Y, Jia X, Chu Q, Wang D (2020) A novel XOR-based threshold visual cryptography with adjustable pixel expansion. 10(4), 1321. https://doi.org/10.3390/app10041321

Haouzia A, Noumeir R (2007) Methods for image authentication: a survey. Multimedia Tools and Applications 39(1):1–46. https://doi.org/10.1007/s11042-007-0154-3

Hodeish ME, Humbe VT (2018) An optimized halftone visual cryptography scheme using error diffusion. Multimedia Tools and Applications 77 (19):24937–24953. https://doi.org/10.1007/s11042-018-5724-z

Hou YC, Lin CF, Chang CY (2001) Visual cryptography for color images without pixel expansion. J Technol 2(4):151. https://doi.org/10.1049/iet-ifs:20080066

Google Scholar  

Hou Y-C (2003) Visual cryptography for color images. Pattern Recogn 36(7):1619–1629. https://doi.org/10.1016/s0031-3203(02)00258-3

Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Transactions on Circuits and Systems for Video Technology 21(11):1760–1764. https://doi.org/10.1109/tcsvt.2011.2106291

Hou Y-C, Quan Z-Y, Tsai C-F, Tseng A-Y (2013) Block-based progressive visual secret sharing. 233, 290–304. https://doi.org/10.1016/j.ins.2013.01.006

Hsu H-C, Chen J, Chen T-S, Lin Y-H (2007) Special type of circular visual cryptography for multiple secret hiding. The Imaging Science Journal 55 (3):175–179. https://doi.org/10.1179/174313107x176289

Hsu S-F, Chang Y-J, Wang R-Z, Lee Y-K, Huang S-Y (2012) Verifiable visual cryptography. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing. IEEE

Ito KH, Tanaka H (1999) image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290

Jana B, Chowdhuri P, auMadhumita Mallick, auShyamal Kumar Mondal (2014) Cheating prevention in visual cryptography using steganographic scheme. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE

Jena D, Jena SK (2009) A novel visual cryptography scheme. In: 2009 International Conference on Advanced Computer Control. IEEE

Jin D (2005) Progressive color visual cryptography. Journal of Electronic Imaging 14(3):033019. https://doi.org/10.1117/1.1993625

Joshi AM, Jadhav DM, Kazi NA, Suryawanshi AN, Katti J (2016) Authentication of grayscale forensic image using visual secret sharing. In: 2016 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE

Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377. https://doi.org/10.1364/ol.12.000377

Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended visual cryptography for color images using coding tables. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE

Kanakkath P, Madathil S, Krishnan R (2018) Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multimedia Tools and Applications 78(2):1315–1344. https://doi.org/10.1007/s11042-018-6158-3

Kang I, Arce GR, Lee H-K (2011) Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing 20(1):132–145. https://doi.org/10.1109/tip.2010.2056376

Kukreja S, Kasana G, Kasana SS (2020) Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors. https://doi.org/10.1007/s00371-020-01883-9

Kumar H, Srivastava A (2014) A secret sharing scheme for secure transmission of color images. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE

Kumar M, Verma HK, Sikka G (2018) A secure lightweight signature based authentication for cloud-IoT crowdsensing environments. Transactions on Emerging Telecommunications Technologies 30(4):e3292. https://doi.org/10.1002/ett.3292

Kumar S, Sharma RK (2013) Recursive information hiding of secrets by random grids. Cryptologia 37(2):154–161. https://doi.org/10.1080/01611194.2012.739585

Lee K-H, Chiu P-L (2012) An extended visual cryptography algorithm for general access structures. IEEE Transactions on Information Forensics and Security 7(1):219–229. https://doi.org/10.1109/tifs.2011.2167611

Lee K-H, Chiu P-L (2013) Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE Transactions on Image Processing 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290

Li P, Ma J, Ma Q (2020) (t, k, n) XOR-based visual cryptography scheme with essential shadows. 72, 102911. https://doi.org/10.1016/j.jvcir.2020.102911

Li P, Ma J, Yin L, Ma Q (2020) A construction method of (2, 3) visual cryptography scheme. 8, 32840–32849. https://doi.org/10.1109/access.2020.2973659

Lin H-C, Yang C-N, Laih C-S, Lin H-T (2013) Natural language letter based visual cryptography scheme. J Vis Commun Image Represent 24 (3):318–331. https://doi.org/10.1016/j.jvcir.2013.01.003

Lin S-J, Chen S-K, Lin J-C (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21(8):900–916. https://doi.org/10.1016/j.jvcir.2010.08.006

Liu GY, Li ZW, Barkaoui K, Al-Ahmari AM (2013) Robustness of deadlock control for a class of petri nets with unreliable resources. Inf Sci 235:259–279. https://doi.org/10.1016/j.ins.2013.01.003

Lu J, Yang Z, Li L, Yuan W, Li L, Chang C-C (2017) Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob Inf Syst 2017:1–12. https://doi.org/10.1155/2017/4356038

Malar S, Kumar J (2011) Error filtering schemes for color images in visual cryptography. Int J Adv Comput Sci Appl, 2(11). https://doi.org/10.14569/ijacsa.2011.021112

Mary GG, Rani MMS (2018) Application of ant colony optimization for enhancement of visual cryptography images. In: Intelligent Systems Reference Library, pp 147–163. Springer International Publishing

Melgar MEV, Farias MCQ (2019) A (2,2) XOR-based visual cryptography scheme without pixel expansion. 63, 102592. https://doi.org/10.1016/j.jvcir.2019.102592

Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729. https://doi.org/10.1007/s10278-014-9700-5

Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: Multimedia and Expo, 2007 IEEE International Conference on. IEEE

Naor M, Shamir A (1995) Visual cryptography. In: Advances in Cryptology - EUROCRYPT’94, pp 1–12. Springer Berlin Heidelberg

Naor M, Shamir A (1997) Visual cryptography II: Improving the contrast via the cover base. In: Security Protocols, pp 197–202. Springer Berlin Heidelberg

Palevicius P, Ragulskis M (2015) Image communication scheme based on dynamic visual cryptography and computer generated holography. Opt Commun 335:161–167. https://doi.org/10.1016/j.optcom.2014.09.041

Pandey A, Som S (2016) Applications and usage of visual cryptography: A review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE

Pang L, Miao D, Lian C (2015) User-friendly random-grid-based visual secret sharing for general access structures. Security and Communication Networks 9(10):966–976. https://doi.org/10.1002/sec.1392

Parakh A, Kak S (2009) A recursive threshold visual cryptography scheme. Cryptologia 26(1):68–76. https://doi.org/10.1080/0161-110291890768

MATH   Google Scholar  

Petrauskiene V, Survila A, Fedaravicius A, Ragulskis M (2014) Dynamic visual cryptography for optical assessment of chaotic oscillations. Optics & Laser Technology 57:129–135. https://doi.org/10.1016/j.optlastec.2013.10.015

Praun E, Hoppe H, Webb M, Finkelstein A (2001) Real-time hatching. In: Proceedings of the 28th annual conference on Computer graphics and interactive techniques - SIGGRAPH ’01. ACM Press

Premkumar S, Narayanan AE (2012) Notice of violation of IEEE publication principles - new visual steganography scheme for secure banking application. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE

Prisco RD, Santis AD (2013) Color visual cryptography schemes for black and white secret images. 510, 62–86. https://doi.org/10.1016/j.tcs.2013.09.005

Prisco RD, Santis AD (2014) On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9(4):653–665. https://doi.org/10.1109/tifs.2014.2305574

Punithavathi P, Geetha S (2016) Cancelable biometric template security using segment-based visual cryptography. In: Advances in Intelligent Systems and Computing, pp 511–521. Springer Singapore

Punithavathi P, Geetha S (2017) Visual cryptography: A brief survey. Information Security Journal: A Global Perspective 26(6):305–317. https://doi.org/10.1080/19393555.2017.1386249

R (2011) A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE

Ramya J, Parvathavarthini B (2014) An extensive review on visual cryptography schemes. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE

Roy S, Venkateswaran P (2014) Online payment system using steganography and visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE

Salama MA, Mursi MFM, Aly M (2018) Safeguarding images over insecure channel using master key visual cryptopgraphy. Ain Shams Engineering Journal 9(4):3001–3013. https://doi.org/10.1016/j.asej.2018.03.002

Saturwar JH, Chaudhari DN (2017) Review of models, issues and applications of digital watermarking based on visual cryptography. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE

Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2008) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1160-1

Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science 70:462–468. https://doi.org/10.1016/j.procs.2015.10.080

Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO). IEEE

Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers 25 (11):1650138. https://doi.org/10.1142/s0218126616501383

Sharma H, Kumar N, Jha GK (2011) Enhancement of security in visual cryptography system using cover image share embedded security algorithm (CISEA). In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011). IEEE

Shivani S, Agarwal S (2016) VPVC: verifiable progressive visual cryptography. Pattern Anal Applic 21(1):139–166. https://doi.org/10.1007/s10044-016-0571-x

Article   MathSciNet   Google Scholar  

Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25(9):1557–1561. https://doi.org/10.1109/tcsvt.2015.2389372

Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651. https://doi.org/10.1016/j.patcog.2007.03.012

Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319. https://doi.org/10.1016/j.sigpro.2017.06.015

Sridhar S, Sudha GF (2021) Two in one image secret sharing scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. 74, 102996. https://doi.org/10.1016/j.jvcir.2020.102996

Thomas SA, Gharge S (2017) Review on various visual cryptography schemes. In: 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE

Thomas SA, Gharge S (2018) Halftone visual cryptography for grayscale images using error diffusion and direct binary search. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE

Tuyls P, Kevenaar T, Schrijen G-J, Staring T, van Dijk M (2004) Visual crypto displays enabling secure communications. In: Security in Pervasive Computing, pp 271–284. Springer Berlin Heidelberg

Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 14(1):25–40. https://doi.org/10.1007/s11554-017-0678-3

Wang L, Yan B, Yang H-M, Pan J-S (2020) Flip extended visual cryptography for gray-scale and color cover images. 13(1), 65. https://doi.org/10.3390/sym13010065

Wang R-Z (2011) Random grid-based visual cryptography with identifiable shares. Journal of Electronic Imaging 20(1):013021. https://doi.org/10.1117/1.3557792

Wang R-Z, Hsu S-F (2011) Tagged visual cryptography. 18(11), 627–630. https://doi.org/10.1109/lsp.2011.2166543

Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: Transactions on Data Hiding and Multimedia Security V, pp 70–105. Springer Berlin Heidelberg

Wu H-C, Wang H-C, Yu R-W (2008) Color visual cryptography scheme using meaningful shares. In: 2008 Eighth International Conference on Intelligent Systems Design and Applications. IEEE

Wu X, Chen D, Yang C-N, Yang Y-Y (2019) A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image. 59, 550–562. https://doi.org/10.1016/j.jvcir.2019.02.008

Wu X, Yang C-N (2020) Probabilistic color visual cryptography schemes for black and white secret images. 70, 102793. https://doi.org/10.1016/j.jvcir.2020.102793

Wu Z, Liu Y-N, Wang D, Yang C-N (2019) An efficient essential secret image sharing scheme using derivative polynomial. Symmetry 11(1):69. https://doi.org/10.3390/sym11010069

Yan X, Liu F, Yan WQ, Yang G, Lu Y (2020) Weighted visual cryptographic scheme with improved image quality. 79(29-30), 21345–21360. https://doi.org/10.1007/s11042-020-08970-y

Yan X, Wang S, Niu X, Yang C-N (2015) Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process 109:317–333. https://doi.org/10.1016/j.sigpro.2014.12.002

Yang C-N (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494. https://doi.org/10.1016/j.patrec.2003.12.011

Yang C-N, Chen P-W, Shih H-W, Kim C (2012) Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17(5):843–850. https://doi.org/10.1007/s00779-012-0535-0

Yang C-N, Chen T-S (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39(7):1300–1314. https://doi.org/10.1016/j.patcog.2006.01.013

Yang C-N, Lin Y-C, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. 55, 102660. https://doi.org/10.1016/j.jisa.2020.102660

Yang C-N, Shih H-W, Wu C-C, Harn L (2012) $k$ out of $n$ region incrementing scheme in visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22(5):799–810. https://doi.org/10.1109/tcsvt.2011.2180952

Yang C-N, Wu C-C, Wang D-S (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173. https://doi.org/10.1016/j.ins.2014.03.033

Yang C-N, Wu X, Chou Y-C, Fu Z (2017) Constructions of general (k,n) reversible AMBTC-based visual cryptography with two decryption options. 48, 182–194. https://doi.org/10.1016/j.jvcir.2017.06.012

Yang N, Gao Q, Shi Y (2018) Visual-cryptographic image hiding with holographic optical elements. Opt Express 26(24):31995. https://doi.org/10.1364/oe.26.031995

Zhang X (2018) A visual cryptography scheme-based DNA microarrays. International Journal of Performability Engineering. https://doi.org/10.23940/ijpe.18.02.p14.334340

Zhao T, Chi Y (2020) Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. 79(17-18), 12165–12181. https://doi.org/10.1007/s11042-020-08632-z

Download references

Acknowledgements

This work is supported in part by the Ministry of Education (MOE) Malaysia under the Fundamental Research Grant Scheme (FRGS), project number FRGS/1/2019/ICT05/USM/02/1.

Author information

Authors and affiliations.

National Advanced IPv6 Centre, Universiti Sains Malaysia, Pulau Pinang, Malaysia

Dyala R. Ibrahim & Rosni Abdullah

School of Computer Sciences, Universiti Sains Malaysia, Pulau Pinang, Malaysia

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Je Sen Teh .

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Ibrahim, D.R., Teh, J.S. & Abdullah, R. An overview of visual cryptography techniques. Multimed Tools Appl 80 , 31927–31952 (2021). https://doi.org/10.1007/s11042-021-11229-9

Download citation

Received : 25 November 2020

Revised : 28 January 2021

Accepted : 07 July 2021

Published : 21 July 2021

Issue Date : September 2021

DOI : https://doi.org/10.1007/s11042-021-11229-9

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Confidentiality
  • Information security
  • Pixel expansion
  • Secret sharing
  • Visual cryptography
  • Find a journal
  • Publish with us
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications You must be signed in to change notification settings

A curated list of cryptography papers, articles, tutorials and howtos.

pFarb/awesome-crypto-papers

Folders and files.

NameName
66 Commits
workflows workflows

Repository files navigation

Awesome crypto papers.

A curated list of cryptography papers, articles, tutorials and howtos for non-cryptographers.

research paper cryptography

The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs includes educating them in cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well.

It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is attacked. It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of wanna-be cryptographers (who better follow structured approach under professional guidance).

It will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.

  • Simple: cryptography for non-engineers .
  • Brief engineer-oriented introductions .
  • Hashing - important bits on modern and classic hashes.
  • Secret key cryptography - all things symmetric encryption.
  • Cryptanalysis - attacking cryptosystems.
  • Public key cryptography: General and DLP - RSA, DH and other classic techniques.
  • Public key cryptography: Elliptic-curve crypto - ECC, with focus on pratcial cryptosystems.
  • Zero Knowledge Proofs - Proofs of knowledge and other non-revealing cryptosystems.
  • Math - useful math materials in cryptographic context.
  • Post-quantum cryptography - Cryptography in post-quantum period.
  • Lectures and educational courses .
  • Online crypto challenges .

Introducing people to data security and cryptography

Simple: cryptography for non-engineers.

  • Nuts and Bolts of Encryption: A Primer for Policymakers .
  • Keys under Doormats - Or why cryptography shouldn't be backdoored, by a all-star committee of crypto researches from around the world.

Brief introductions

  • An Overview of Cryptography - By Gary C. Kessler.
  • Using Encryption for Authentication in Large Networks - By Needham, Schroeder: this is were crypto-based auth starts.
  • Communication Theory of Secrecy Systems - Fundamental cryptography paper by Claude Shannon.

General cryptographic interest

  • Another Look at “Provable Security” - Inquiries into formalism and naive intuition behind security proofs, by Neal Koblitz et al.
  • The security impact of a new cryptographic library - Introductory paper on NaCl, discussing important aspects of implementing cryptography and using it as a larger building block in security systems, by Daniel J. Bernstein, Tanja Lange, Peter Schwabe.

Specific topics

  • FIPS 198-1: HMACs - The Keyed-Hash Message Authentication Code FIPS document.
  • FIPS 202: SHA3 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.
  • Birthday problem - The best simple explanation of math behind birthday attack .
  • On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 - Security analysis of different legacy HMAC schemes by Jongsung Kim et al.
  • On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - Security of randomized CBC-MACs and a new construction that resists birthday paradox attacks and provably reaches full security, by E. Jaulmes et al.

Secret key cryptography

  • FIPS 197 - AES FIPS document.
  • List of proposed operation modes of AES - Maintained by NIST.
  • Recomendation for Block Cipher modes of operation: Methods and Techniques .
  • Stick figure guide to AES - If stuff above was a bit hard or you're looking for a good laugh.
  • Cache timing attacks on AES - Example of designing great practical attack on cipher implementation, by Daniel J. Bernstein.
  • Cache Attacks and Countermeasures: the Case of AES - Side channel attacks on AES, another view, by Dag Arne Osvik, Adi Shamir and Eran Tromer.
  • Salsa20 family of stream ciphers - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.
  • New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba - Analysis of Salsa20 family of ciphers, by Jean-Philippe Aumasson et al.
  • ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS) - IETF Draft of ciphersuite family, by Adam Langley et al.
  • AES submission document on Rijndael - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.
  • Ongoing Research Areas in Symmetric Cryptography - Overview of ongoing research in secret key crypto and hashes by ECRYPT Network of Excellence in Cryptology.
  • The Galois/Counter Mode of Operation (GCM) - Original paper introducing GCM, by by David A. McGrew and John Viega.
  • The Security and Performance of the Galois/Counter Mode (GCM) of Operation - Design, analysis and security of GCM, and, more specifically, AES GCM mode, by David A. McGrew and John Viega.
  • GCM Security Bounds Reconsidered - An analysis and algorithm for nonce generation for AES GCM with higher counter-collision probability, by Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.
  • Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes - An overview of existing searchable encryption schemes, and analysis of scheme built on AES-GCM, blind index and bloom filter by Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk.
  • DES is not a group - Old but gold mathematical proof that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. That means that multiple DES encryption is not equivalent to single DES encryption and means that the size of the subgroup generated by the set of DES permutations is greater than 10^2499, which is too large for potential attacks on DES, which would exploit a small subgroup.

Cryptanalysis

  • Differential Cryptanalysis of Salsa20/8 - A great example of stream cipher cryptanalysis, by Yukiyasu Tsunoo et al.
  • Slide Attacks on a Class of Hash Functions - Applying slide attacks (typical cryptanalysis technique for block ciphers) to hash functions, M. Gorski et al.
  • Self-Study Course in Block Cipher Cryptanalysis - Attempt to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn cryptanalytic techniques and ways to break new algorithms, by Bruce Schneier.
  • Statistical Cryptanalysis of Block Ciphers - By Pascal Junod.
  • Cryptanalysis of block ciphers and protocols - By Elad Pinhas Barkan.
  • Too much crypto - Analysis of number of rounds for symmetric cryptography primitives, and suggestions to do fewer rounds, by Jean-Philippe Aumasson.
  • How to Break MD5 and Other Hash Functions - A 2005 paper about modular differential collision attack on MD5, MD4 and other hash functions, by Xiaoyun Wang and Hongbo Yu.
  • New attacks on Keccak-224 and Keccak-256 - A 2012 paper about using the combination of differential and algebraic techniques for collision attacks on SHA-3, by Itai Dinur, Orr Dunkelman, Adi Shamir.
  • A Single-Key Attack on the Full GOST Block Cipher - An attack ("Reflection-Meet-inthe-Middle Attack") on GOST block cipher that allows to recover key with 2^225 computations and 2^32 known plaintexts, by Takanori Isobe.
  • Intro to Linear & Differential Cryptanalysis - A beginner-friendly paper explaining and demonstrating techniques for linear and differential cryptanalysis.
  • MEGA: Malleable Encryption Goes Awry - Proof-of-concept versions of attacks on MEGA data storage. Showcasing their practicality and exploitability. Official webpage .

Public key cryptography: General and DLP

  • New Directions in Cryptography - Seminal paper by Diffie and Hellman, introducing public key cryptography and key exchange/agreement protocol.
  • RFC 2631: Diffie-Hellman Key Agreement - An explanation of the Diffie-Hellman methon in more engineering terms.
  • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems - Original paper introducing RSA algorithm.
  • RSA Algorithm - Rather education explanation of every bit behind RSA.
  • Secure Communications Over Insecure Channels - Paper by R. Merkle, predated "New directions in cryptography" though it was published after it. The Diffie-Hellman key exchange is an implementation of such a Merkle system.
  • On the Security of Public Key Protocols - Dolev-Yao model is a formal model, used to prove properties of interactive cryptographic protocols.
  • How to Share a Secret - A safe method for sharing secrets.
  • Twenty Years of Attacks on the RSA Cryptosystem - Great inquiry into attacking RSA and it's internals, by Dan Boneh.
  • Remote timing attacks are practical - An example in attacking practical crypto implementationby D. Boneh, D. Brumley.
  • The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited - by K. Bentahar.
  • SoK: Password-Authenticated Key Exchange – Theory, Practice, Standardization and Real-World Lessons - History and classification of the PAKE algorithms.
  • RSA, DH and DSA in the Wild - Collection of implementation mistakes which lead to exploits of assymetric cryptography.

Public key cryptography: Elliptic-curve crypto

  • Elliptic Curve cryptography: A gentle introduction .
  • Explain me like I'm 5: How digital signatures actually work - EdDSA explained with ease and elegance.
  • Elliptic Curve Cryptography: finite fields and discrete logarithms .
  • Detailed Elliptic Curve cryptography tutorial .
  • Elliptic Curve Cryptography: ECDH and ECDSA .
  • Elliptic Curve Cryptography: breaking security and a comparison with RSA .
  • Elliptic Curve Cryptography: the serpentine course of a paradigm shift - Historic inquiry into development of ECC and it's adoption.
  • Let's construct an elliptic curve: Introducing Crackpot2065 - Fine example of building up ECC from scratch.
  • Explicit-Formulas Database - For many elliptic curve representation forms.
  • Curve25519: new Diffie-Hellman speed records - Paper on Curve25519.
  • Software implementation of the NIST elliptic curves over prime fields - Pracitcal example of implementing elliptic curve crypto, by M. Brown et al.
  • High-speed high-security signatures - Seminal paper on EdDSA signatures on ed25519 curve by Daniel J. Bernstein et al.
  • Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters (NIST SP 800-186) - Official NIST guide how securely implement elliptic curves. It also includes math shortcuts, optimizations and possible security risk of wrong algorithm implementation. (February 2023)
  • Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies - Computing private keys by analyzing and exploiting biases in ECDSA nonces.
  • Minerva: The curse of ECDSA nonces - Exploiting timing/bit-length leaks for recovering private keys from ECDSA signatures
  • LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage - Breaking 160-bit curve ECDSA using less than one bit leakage.

Zero Knowledge Proofs

  • Proofs of knowledge - A pair of papers which investigate the notions of proof of knowledge and proof of computational ability, M. Bellare and O. Goldreich.
  • How to construct zero-knowledge proof systems for NP - Classic paper by Goldreich, Micali and Wigderson.
  • Proofs that yield nothing but their validity and a Methodology of Cryptographic protocol design - By Goldreich, Micali and Wigderson, a relative to the above.
  • A Survey of Noninteractive Zero Knowledge Proof System and Its Applications .
  • How to Prove a Theorem So No One Else Can Claim It - By Manuel Blum.
  • Information Theoretic Reductions among Disclosure Problems - Brassau et al.
  • Knowledge complexity of interactive proof systems - By GoldWasser, Micali and Rackoff. Defining computational complexity of "knowledge" within zero knowledge proofs.
  • A Survey of Zero-Knowledge Proofs with Applications to Cryptography - Great intro on original ZKP protocols.
  • Zero Knowledge Protocols and Small Systems - A good intro into Zero knowledge protocols.
  • Multi-Theorem Preprocessing NIZKs from Lattices - Construction of non-interactive zero-knowledge (NIZK) proofs using lattice-based preprocessing models, by Sam Kim and David J. Wu.

Key Management

  • Recommendation for Key Management – Part 1: General - Methodologically very relevant document on goals and procedures of key management.
  • Selecting Cryptographic Key Sizes - Classic paper from 1999 with guidelines for the determination of key sizes for symmetric cryptosystems, RSA, ECC, by Arjen K. Lenstra and Eric R. Verheul.
  • PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Post-quantum cryptography

  • Post-quantum cryptography - dealing with the fallout of physics success - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers.
  • Post-quantum cryptography - Introduction to post-quantum cryptography.
  • Post-quantum RSA - Daniel Bernshtein's insight how to save RSA in post-quantum period.
  • MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps - The Oil and Vinegar signature scheme, proposed in 1997 by Patarin, is one of the oldest and best-understood multivariate quadratic signature schemes. It has excellent performance and signature sizes. This paper is about enhancing this algorithm in usage in the post-quantum era. Official website .

That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.

  • A Graduate Course in Applied Cryptography - By Dan Boneh and Victor Shoup. A well-balanced introductory course into cryptography, a bit of cryptanalysis and cryptography-related security.
  • Analysis and design of cryptographic hash functions, MAC algorithms and block ciphers - Broad overview of design and cryptanalysis of various ciphers and hash functions, by Bart Van Rompay.
  • CrypTool book - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.
  • Handbook of Applied Cryptography - By Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Good classical introduction into cryptography and ciphers.
  • The joy of Cryptography - By Mike Rosulek. A lot of basic stuff covered really well. No ECC.
  • A Computational Introduction to Number Theory and Algebra - By Victor Shoup, excellent starters book on math universally used in cryptography.

Lectures and educational courses

  • Understanding cryptography: A textbook for Students and Practitioners - Textbook, great lectures and problems to solve.
  • Crypto101 - Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels.
  • A Course in Cryptography - Lecture notes by Rafael Pass, Abhi Shelat.
  • Lecture Notes on Cryptography - Famous set of lectures on cryptography by Shafi Goldwasser (MIT), M. Bellare (University of California).
  • Introduction to Cryptography by Christof Paar - Video course by Christof Paar (University of Bochum in Germany). In english.
  • Cryptography I - Stanford University course on Coursera, taught by prof. Dan Boneh. Cryptography II is still in development.

Online crypto challenges

Not exactly papers, but crypto challenges are awesome educational material.

Cryptopals crypto challenges .

id0-rsa crypto challenges .

MTC3 - xipher contest with more than 200 challenges of different levels, a moderated forum, and a hall-of-fame.

CC0

To the extent possible under law, author has waived all copyright and related or neighboring rights to this work.

Contributors 8

@pFarb

Network Security and Cryptography Challenges and Trends on Recent Technologies

Muhammad Zubair

  • The Islamia University of Bahawalpur

Aqib Ali at Concordia College Bahawalpur

  • Concordia College Bahawalpur
  • This person is not on ResearchGate, or hasn't claimed this research yet.

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Samson B. A. Abura

  • S V Padmavathi Devi

Patrapati Chandrakanth

  • Sarah Fawzia

Mujiba Shaima

  • Nasir Uddin Rana
  • Hanhan Hanafiah Solihin, S.Kom., M.Kom

Firman Noor Hasan

  • Rr. Isni Anisah Puspowati. H, ST., M.Kom

Kaizen Media Publishing

  • Muhammad Rehan Afzal

Aqib Ali

  • Mrs Shaik Karimunni

Samreen Naeem

  • Baqir Nadeem Hashmi
  • Muhammad Mehboob Khan

Sania Anam

  • Samreen Naeem

Mazhar Hameed

  • Fengbao Yang

Sibghat Ullah Bazai

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

This week: the arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Cryptography and Security

Title: alignment-aware model extraction attacks on large language models.

Abstract: Model extraction attacks (MEAs) on large language models (LLMs) have received increasing research attention lately. Existing attack methods on LLMs inherit the extraction strategies from those designed for deep neural networks (DNNs) yet neglect the inconsistency of training tasks between MEA and LLMs' alignments. As such, they result in poor attack performances. To tackle this issue, we present Locality Reinforced Distillation (LoRD), a novel model extraction attack algorithm specifically for LLMs. In particular, we design a policy-gradient-style training task, which utilizes victim models' responses as a signal to guide the crafting of preference for the local model. Theoretical analysis has shown that i) LoRD's convergence procedure in MEAs is consistent with the alignments of LLMs, and ii) LoRD can reduce query complexity while mitigating watermark protection through exploration-based stealing. Extensive experiments on domain-specific extractions demonstrate the superiority of our method by examining the extraction of various state-of-the-art commercial LLMs.
Comments: Source code:
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

COMMENTS

  1. (PDF) A Review Paper on Cryptography

    Conference PaperPDF Available. A Review Paper on Cryptography. June 2019. June 2019. DOI: 10.1109/ISDFS.2019.8757514. Conference: 2019 7th International Symposium on Digital Forensics and Security ...

  2. Cryptography

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Cryptography is an ...

  3. A New Approach of Cryptography for Data Encryption and Decryption

    Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...

  4. Cryptography: Recent research trends of encrypting mathematics

    Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.

  5. A Review Paper on Cryptography

    A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...

  6. A review on various cryptographic techniques & algorithms

    This paper showed that we reviewed a part of the evaluation, which was also organized in cryptography, beginning with how the numbers used for various security purposes in cryptography operate. IT and attractive procedures for guaranteeing particular, cash-related, clinical and web-business data and ensuring the required standard of safety will ...

  7. Cryptography: Advances in Secure Communication and Data Protection

    known as symmetric key cryptography, or secret key cryptography. The security and. efficiency of encryption algorithms are enhanced with advancements in symmetric key. cryptography. One notable ...

  8. Home

    Journal of Cryptology - SpringerLink

  9. PDF NUMBER THEORY IN CRYPTOGRAPHY

    techniques used to construct ciphers. Overall, this paper will demonstrate that number theory is a crucial component of cryptography by allowing a coherent way of encrypting a message that is also challenging to decrypt. The discussion in this paper follows the set of notes [1] [2] [3] by Evan Dummit. 2. Number Theory Background 2.1. Basic ...

  10. Home

    Cryptography and Communications - SpringerLink

  11. A comprehensive survey of cryptography key management systems

    NIST-approved cryptography algorithms are chosen based on security criteria such as confidentiality and identity authentication [14]. This paper will focus on the architectural aspects of KMS. The primary contributions of this research paper include: • Conduct a comprehensive literature survey of KMS systems. •

  12. (PDF) Mathematics for Cryptography: A Guide to Mathematical

    PDF | This article provides an overview of various cryptography algorithms, discussing their mathematical underpinnings and the areas of mathematics... | Find, read and cite all the research you ...

  13. Post Quantum Cryptography: Techniques, Challenges, Standardization, and

    Post Quantum Cryptography

  14. PDF A Review Paper on Cryptography

    This paper provides an overview of the various techniques used by networks to enhance security, such as cryptography. Anjula Gupta et al. [8] showcased the origins and meaning of cryptography as well as how information security has become a challenging issue in the fields of computers and communications.

  15. Comparative Analysis of Cryptographic Key Management Systems

    Keywords: Cryptography, Key Distribution, Key Management Service, Secret Handling. 1 Introduction The complexity and reliability of any cryptosystem is based on the use of crypto-graphic keys. The key exchange is one of the mechanisms at core of the process and it ensure confidentiality when exchanging information between users and its behaviour is

  16. An overview of visual cryptography techniques

    Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.

  17. PDF Quantum Cryptography

    Quantum cryptography is one of the emerging topics in the field of computer industry. This paper focus on quantum cryptography and how this technology contributes value to a defense-in-depth strategy pertaining to completely secure key distribution. The scope of this paper covers the weaknesses of modern digital cryptosystems, the fundamental ...

  18. (PDF) Cryptography

    [email protected]. Ab stract—The wide use of cryptography is a necessary. consequence of the information revolution. With the existence of. electronic transmissions on computer ...

  19. An Exploration to the Quantum Cryptography Technology

    The aim of this paper is to explore the knowledge related to the Quantum Cryptography, Quantum Key Distribution; and their elements, implementation, and the latest research. Moreover, exploration of the loopholes and the security of Internet of Things (IoT) infrastructure and current used classical cryptographic algorithms are described in the ...

  20. GitHub

    Ongoing Research Areas in Symmetric Cryptography - Overview of ongoing research in secret key crypto and hashes by ECRYPT Network of Excellence in Cryptology. The Galois/Counter Mode of Operation (GCM) - Original paper introducing GCM, by by David A. McGrew and John Viega.

  21. PDF Cryptography: From the Ancient History to Now, It'S Applications and A

    cryptography and some basic theorems to build different types of cryptography models. This research paper will propose few propositions based on solvability equation and will introduce a solvability series. From ancient time to now there are several cryptographic models are invented. This research paper will present a new type of

  22. Network Security and Cryptography Challenges and Trends on Recent

    This paper discusses cryptography research and algorithms. Cryptography will anonymize financial, personal, e-commerce, and medical data. Cryptography protects network-to-network .

  23. PDF Research on Various Cryptography Techniques

    Index Terms — Cryptography, data security, public key, resource consumption, secret key. I. INTRODUCTION Security is an important in protecting data against intruders. One of the most important methods for ensuring data secrecy is cryptography. Cryptography is secret writing for data security protection. Well-hidden data cannot

  24. Alignment-Aware Model Extraction Attacks on Large Language Models

    Model extraction attacks (MEAs) on large language models (LLMs) have received increasing research attention lately. Existing attack methods on LLMs inherit the extraction strategies from those designed for deep neural networks (DNNs) yet neglect the inconsistency of training tasks between MEA and LLMs' alignments. As such, they result in poor attack performances. To tackle this issue, we ...