Authenticated encryption and steganography in unconditional security setting

被引:0
|
作者
Matsumoto, T [1 ]
Shikata, J [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Hodogaya Ku, Yokohama, Kanagawa 2408501, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on tire security of these techniques against adversaries with unbounded computational sources. First, we reveal the strong security notion of uncondtionally secure authenticated encryption and show how to achieve it. Second, we study unconditionally secure stegosystems under active attacks and show how to construct them by the above mentioned unconditionally secure authenticated encryption schemes.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [21] Enhanced the Security of Image Steganography Through Image Encryption
    Bhardwaja, Rupali
    Khanna, Divya
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [22] A Hybrid Approach for Image Security by Combining Encryption and Steganography
    Saini, Jaspal Kaur
    Verma, Harsh K.
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 607 - 611
  • [23] Improved Security Based on Combined Encryption and Steganography Techniques
    Mocanu, Stefan
    Duluta, Andrei
    Merezeanu, Daniel
    Pietraru, Radu
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2017, 26 (01): : 115 - 126
  • [24] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [25] A broadcast encryption scheme with free-riders but unconditional security
    Adelsbach, Andre
    Greveler, Ulrich
    [J]. DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 246 - 257
  • [26] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    Shenets, N. N.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 857 - 864
  • [27] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [28] Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
    Andreeva, Elena
    Bhati, Amit Singh
    Vizar, Damian
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 512 - 534
  • [29] Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
    N. N. Shenets
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 857 - 864
  • [30] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Hemangee K. Kapoor
    G. Bhoopal Rao
    Sharique Arshi
    Gaurav Trivedi
    [J]. Circuits, Systems, and Signal Processing, 2013, 32 : 2605 - 2622