Authenticated encryption and steganography in unconditional security setting

被引:0
|
作者
Matsumoto, T [1 ]
Shikata, J [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Hodogaya Ku, Yokohama, Kanagawa 2408501, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address authenticated encryption, the cryptographic technique that simultaneously provides both confidentiality and authenticity, and steganography that hides the very existence of messages. We focus on tire security of these techniques against adversaries with unbounded computational sources. First, we reveal the strong security notion of uncondtionally secure authenticated encryption and show how to achieve it. Second, we study unconditionally secure stegosystems under active attacks and show how to construct them by the above mentioned unconditionally secure authenticated encryption schemes.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [41] KDM-CCA Security from RKA Secure Authenticated Encryption
    Lu, Xianhui
    Li, Bao
    Jia, Dingding
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 559 - 583
  • [42] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    [J]. Journal of Cryptology, 2019, 32 : 895 - 940
  • [43] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [44] Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
    Fan Zhang
    Zi-yuan Liang
    Bo-lin Yang
    Xin-jie Zhao
    Shi-ze Guo
    Kui Ren
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1475 - 1499
  • [45] Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
    Zhang, Fan
    Liang, Zi-yuan
    Yang, Bo-lin
    Zhao, Xin-jie
    Guo, Shi-ze
    Ren, Kui
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (12) : 1475 - 1499
  • [46] Sponge-Based Authenticated Encryption: Security Against Quantum Attackers
    Janson, Christian
    Struck, Patrick
    [J]. POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 230 - 259
  • [47] INT-RUP Security of Checksum-Based Authenticated Encryption
    Zhang, Ping
    Wang, Peng
    Hu, Honggang
    Cheng, Changsong
    Kuai, Wenke
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 147 - 166
  • [48] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 647
  • [49] Authenticated encryption scheme with (t,n) shared verification and its security
    Lu, J.Z.
    Chen, H.Y.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (09):
  • [50] Extended abstract: Provable-security analysis of authenticated encryption in kerberos
    Boldyreva, Alexandra
    Kumar, Virendra
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 92 - +