ANALYSIS OF HOMOMORPHIC PROPERTIES OF RSA-BASED CRYPTOSYSTEM FOR IMAGE SHARING

被引:0
|
作者
Islam, Naveed [1 ]
Puech, William [1 ]
Hayat, Khizar [1 ]
Brouzet, Robert [2 ]
机构
[1] Univ Montpellier 2, CNRS, UMR 5506, LIRMM Lab, F-34095 Montpellier 5, France
[2] Univ Montpellier 2, CNRS, UMR 5146, I3M Lab, Montpellier, France
关键词
Security analysis; Cryptography; Homomorphism; Shared image;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret sharing between two or more parties, exploiting multiplicative homomorphic properties of RSA, may result in false data blocks during the extraction of message. This paper investigates factors that lead to such false blocks and suggest a controlled solution by analyzing their probability distribution. In this paper we prove that false blocks do exist and show that larger sizes of the prime product reduce the error probability of false blocks in extracted messages.
引用
收藏
页码:1825 / +
页数:2
相关论文
共 50 条
  • [41] Weakness in a RSA-based password authenticated key exchange protocol
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Changhan
    Lim, Jongin
    INFORMATION PROCESSING LETTERS, 2008, 108 (06) : 339 - 342
  • [42] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [43] Comment on traceability on RSA-based partially signature with low computation
    Wu, LC
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1344 - 1348
  • [44] Multi-objective evolutionary hardware for RSA-based cryptosystems
    Nedjah, N
    Mourelle, LD
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 503 - 507
  • [45] A complete and explicit security reduction algorithm for RSA-based cryptosystems
    Kurosawa, K
    Schmidt-Samoa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 474 - 491
  • [46] A Bergman ring based cryptosystem analogue of RSA
    Long, D. T.
    Thu, D. T.
    Thuc, D. N.
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [47] New Methods and Abstractions for RSA-Based Forward Secure Signatures
    Hohenberger, Susan
    Waters, Brent
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 292 - 312
  • [48] Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation
    Yang, Ching-Nung
    Wu, Xiaotian
    Lin, Hsuan-Yu
    Kim, Cheonshik
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [49] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 63 - 75
  • [50] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47