Authenticated encryption and steganography in unconditional security setting

被引:0
作者
Matsumoto, T [1 ]
Shikata, J [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Hodogaya Ku, Yokohama, Kanagawa 2408501, Japan
来源
2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY | 2005年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on tire security of these techniques against adversaries with unbounded computational sources. First, we reveal the strong security notion of uncondtionally secure authenticated encryption and show how to achieve it. Second, we study unconditionally secure stegosystems under active attacks and show how to construct them by the above mentioned unconditionally secure authenticated encryption schemes.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 36 条
[1]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]  
Backes M, 2005, LECT NOTES COMPUT SC, V3378, P210
[4]  
BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
[5]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[6]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[7]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P317
[8]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[9]  
CACHIN C, 1998, 2 INT WORKSH LECT NO, P306
[10]  
Chaum D., 1984, LECTURE NOTES COMPUT, V196, P411, DOI DOI 10.1007/3-540-39568-7_32