Public-key steganography

被引:0
|
作者
von Ahn, L [1 ]
Hopper, NJ [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS | 2004年 / 3027卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages axe being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Alm [7] for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon's attacker-specific adaptive chosen-ciphertext adversaries from CRYPTO 91 [10]).
引用
收藏
页码:323 / 341
页数:19
相关论文
共 50 条
  • [21] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [22] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [23] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [24] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [25] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [26] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [27] NEW PUBLIC-KEY CRYPTOSYSTEM
    KALIPHA, SM
    SADA, JWA
    HUSSAIN, HA
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1990, 21 (01) : 205 - 215
  • [28] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [29] ON THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    VANTILBURG, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 119 - 131
  • [30] Human Public-Key Encryption
    Ferradi, Houda
    Geraud, Remi
    Naccache, David
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 494 - 505