Public-key steganography

被引:0
|
作者
von Ahn, L [1 ]
Hopper, NJ [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS | 2004年 / 3027卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages axe being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Alm [7] for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon's attacker-specific adaptive chosen-ciphertext adversaries from CRYPTO 91 [10]).
引用
收藏
页码:323 / 341
页数:19
相关论文
共 50 条
  • [31] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [32] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [33] The Cubic Public-Key Transformation
    Subhash Kak
    Circuits, Systems & Signal Processing, 2007, 26 : 353 - 359
  • [34] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [35] Public-key infrastructure interoperation
    Ford, W
    1998 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 4, 1998, : 329 - 333
  • [36] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [37] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [38] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [39] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [40] Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding
    Chen, WY
    Chen, CH
    OPTICAL ENGINEERING, 2003, 42 (10) : 2886 - 2892