Public-key steganography

被引:0
|
作者
von Ahn, L [1 ]
Hopper, NJ [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect that these hidden messages axe being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganography similar to those introduced by Hopper, Langford and von Alm [7] for the private-key setting. We also give the first protocols for public-key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adversaries that have access to a decoding oracle (a steganographic analogue of Rackoff and Simon's attacker-specific adaptive chosen-ciphertext adversaries from CRYPTO 91 [10]).
引用
收藏
页码:323 / 341
页数:19
相关论文
共 50 条
  • [31] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [32] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [33] Public-key infrastructure interoperation
    Ford, W
    1998 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 4, 1998, : 329 - 333
  • [34] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [35] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [36] Quantum Public-Key Cryptosystem
    Ming-Xing Luo
    Xiu-Bo Chen
    Deng Yun
    Yi-Xian Yang
    International Journal of Theoretical Physics, 2012, 51 : 912 - 924
  • [37] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [38] Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding
    Chen, WY
    Chen, CH
    OPTICAL ENGINEERING, 2003, 42 (10) : 2886 - 2892
  • [39] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [40] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468