Public-key steganography

被引:0
|
作者
von Ahn, L [1 ]
Hopper, NJ [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages axe being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Alm [7] for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon's attacker-specific adaptive chosen-ciphertext adversaries from CRYPTO 91 [10]).
引用
收藏
页码:323 / 341
页数:19
相关论文
共 50 条
  • [21] NEW PUBLIC-KEY CRYPTOSYSTEM
    KALIPHA, SM
    SADA, JWA
    HUSSAIN, HA
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 1990, 21 (01) : 205 - 215
  • [22] MODIFICATION OF A PUBLIC-KEY CRYPTOSYSTEM
    OKAMOTO, T
    ELECTRONICS LETTERS, 1987, 23 (16) : 814 - 815
  • [23] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [24] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [25] SYMMETRICAL PUBLIC-KEY ENCRYPTION
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 128 - 137
  • [26] ON THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    VANTILBURG, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 119 - 131
  • [27] Public-key encryption with chaos
    Kocarev, L
    Sterjev, M
    Fekete, A
    Vattay, G
    CHAOS, 2004, 14 (04) : 1078 - 1082
  • [28] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [29] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [30] The Cubic Public-Key Transformation
    Subhash Kak
    Circuits, Systems & Signal Processing, 2007, 26 : 353 - 359