ANALYSIS OF HOMOMORPHIC PROPERTIES OF RSA-BASED CRYPTOSYSTEM FOR IMAGE SHARING

被引:0
|
作者
Islam, Naveed [1 ]
Puech, William [1 ]
Hayat, Khizar [1 ]
Brouzet, Robert [2 ]
机构
[1] Univ Montpellier 2, CNRS, UMR 5506, LIRMM Lab, F-34095 Montpellier 5, France
[2] Univ Montpellier 2, CNRS, UMR 5146, I3M Lab, Montpellier, France
关键词
Security analysis; Cryptography; Homomorphism; Shared image;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret sharing between two or more parties, exploiting multiplicative homomorphic properties of RSA, may result in false data blocks during the extraction of message. This paper investigates factors that lead to such false blocks and suggest a controlled solution by analyzing their probability distribution. In this paper we prove that false blocks do exist and show that larger sizes of the prime product reduce the error probability of false blocks in extracted messages.
引用
收藏
页码:1825 / +
页数:2
相关论文
共 50 条
  • [31] RSA-based Proxy Signature for Media Independent Handover
    Hyo-sun ROH
    Sou-hwan JUNG
    Journal of Measurement Science and Instrumentation, 2010, (04) : 349 - 353
  • [32] An Efficient RSA-Based Remote User Authentication Scheme
    Shi, Wenbo
    Chen, Yitao
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2012, 15 (03): : 266 - 276
  • [33] Lossless Data Hiding Based on Homomorphic Cryptosystem
    Zheng, Shuli
    Wang, Yuzhao
    Hu, Donghui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 692 - 705
  • [34] An improved RSA-based access control scheme for hierarchical groups
    Cao, J
    Yao, ZA
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 719 - 723
  • [35] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 116 - +
  • [36] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [37] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [38] Retrofitting fairness on the original RSA-based E-cash
    Xu, SH
    Yung, MT
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 51 - 68
  • [39] The Homomorphic Properties of McEliece Public-key Cryptosystem
    Zhao Cheng-cheng
    Yang Ya-tao
    Li Zi-chen
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 39 - 42
  • [40] Generalization of RSA cryptosystem based on 2η primes
    Shah, Tariq
    Zohaib, Muhammad
    Xin, Qin
    Almutairi, Bander
    Sajjad, Muhammad
    AIMS MATHEMATICS, 2023, 8 (08): : 18833 - 18845