Public-key steganography

被引:0
|
作者
von Ahn, L [1 ]
Hopper, NJ [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages axe being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Alm [7] for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon's attacker-specific adaptive chosen-ciphertext adversaries from CRYPTO 91 [10]).
引用
收藏
页码:323 / 341
页数:19
相关论文
共 50 条
  • [1] Applied public-key steganography
    Guillon, P
    Furon, T
    Duhamel, P
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 38 - 49
  • [2] Public-key steganography with active attacks
    Backes, M
    Cachin, C
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 210 - 226
  • [3] On public-key steganography in the presence of an active warden
    Craver, S
    INFORMATION HIDING, 1998, 1525 : 355 - 368
  • [4] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [5] Public-Key Cryptanalysis
    Nguyen, Phong Q.
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 67 - 119
  • [6] PUBLIC-KEY SYSTEMS
    BRASSARD, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 325 : 20 - 39
  • [7] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [8] PUBLIC-KEY PATENT
    BENNETT, R
    BYTE, 1985, 10 (07): : 16 - 16
  • [9] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [10] An efficient public-key framework
    Zhou, JY
    Bao, F
    Deng, R
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 88 - 99