搜索结果: 1-14 共查到“军队指挥学 Steganography”相关记录14条 . 查询时间(0.078 秒)
On the Gold Standard for Security of Universal Steganography
Eurocrypt 2018 steganography public-key cryptography
2018/1/31
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persis...
As cryptography is the standard way of ensuring privacy, integrity and confidentiality of a public channel, steganography steps in to provide even stronger assumptions. Thus, in the case of cryptology...
Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only fo...
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption
Public Key Encryption randomized algorithms
2016/6/2
We describe a general technique to protect randomized algorithms against kleptographic attacks. We then apply the technique to construct the first IND-CPA secure public-key encryp- tion scheme in the ...
Broadcast Steganography
Steganography Broadcast Encryption Receiver Anonymity Broadcast Steganography
2013/4/18
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-recipient setting. BS enables a sender to communicate covertly with a dynamically designated set of re...
An Information-Theoretic Model for Steganography
Information-Theoretic Model Steganography
2009/4/17
An information-theoretic model for steganography with a passive adversary is proposed.
The adversary’s task of distinguishing between an innocent cover message C and a modified
message S containing ...
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper
(who listens to all communications) cannot even tell that a secret message is...
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
foundation steganography public key
2009/4/10
We define the notion of adative chosen stegotext security.We then construct efficient public key steganographic schemes secure against adaptively chosen stegotext attacks, without resort to any specia...
Informally, a public-key steganography protocol allows two parties, who have never met or
exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even
detect th...
A complexity-theoretic model for public-key steganography with active attacks is introduced. The
notion of steganographic security against adaptive chosen-covertext attacks (SS-CCA) and a relaxation
...
We construct efficient public key steganographic schemes, without resort to any special exis-
tence assumption such as unbiased functions. This is the first time such a construction is obtained. Not ...
Steganography is the science of hiding the very presence of a secret message within a public communication
channel. In Crypto 2002, Hopper, Langford, and von Ahn proposed the first complexitytheoreti...
Upper and Lower Bounds on Black-Box Steganography
steganography covert communication rejection sampling
2009/3/27
We study the limitations of steganography when the sender is not using any properties of the
underlying channel beyond its entropy and the ability to sample from it. On the negative side,
we show th...
Steganography with Imperfect Samplers
Keywords Steganography information hiding digital signature Markov process
2009/3/3
The goal of steganography is to pass secret messages by disguising them as innocent-looking covertexts.Real world stegosystems are often broken because they make invalid assumptions about the system’s...