Authenticated encryption and steganography in unconditional security setting

被引:0
|
作者
Matsumoto, T [1 ]
Shikata, J [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Hodogaya Ku, Yokohama, Kanagawa 2408501, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on tire security of these techniques against adversaries with unbounded computational sources. First, we reveal the strong security notion of uncondtionally secure authenticated encryption and show how to achieve it. Second, we study unconditionally secure stegosystems under active attacks and show how to construct them by the above mentioned unconditionally secure authenticated encryption schemes.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [1] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [2] On Unconditional ε-Security of Private Key Encryption
    Jiang, Shaoquan
    [J]. COMPUTER JOURNAL, 2014, 57 (10): : 1570 - 1579
  • [3] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [4] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [5] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
  • [6] On the security of generalization of threshold signature and authenticated encryption
    Tseng, Yuh-Min
    Jan, Jinn-Ke
    Chien, Hung-Yu
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2606 - 2609
  • [7] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [8] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [9] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [10] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163