On hiding information from an oracle

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On hiding information from an oracle

We consider the problem of computing with encrypted data. Player A wishes to know the value f(x) for some x but lacks the power to compute it. Player B has the power to compute f and is willing to send f(y) to A if she sends him y, for any y. Informally, an encryption scheme for the problem f is a method by which A, using her inferior resources, can transform the cleartext instance x into an en...

متن کامل

Secure Circuit Evaluation a Protocol Based on Hiding Information from an Oracle

We present a simple protocol for two-player secure circuit evaluation. The protocol enables players C and D to cooperate in the computation of f(x) while D conceals her data x from C and C conceals his circuit for f from D. The protocol is based on the technique of hiding information from an oracle [Abadi, Feigenbaum, Kilian, J. Comput. System Sci. 39(1):21{50, August, 1989].

متن کامل

Random Oracle Model of Information Hiding System

Random Oracle Model (ROM) is an effective method for measuring the practical security of cryptograph. In this paper, we try to use it into information hiding system (IHS). Because IHS has its own properties, the ROM must be modified if it is used into IHS. Firstly, we fully discuss why and how to modify each part of ROM respectively. The main changes include: 1) Divide the attacks that IHS may ...

متن کامل

An Improved Information Hiding Algorithm

Hiding technology is a newly developed discipline that concludes many subjects and covers many fields, and it hides the transferring information in the carrier, which greatly increases the safety of information transmission. In order to hide and transfer information more effectively, the paper researched the cloud algorithm in the model of information hiding. It also studied the model of inform...

متن کامل

Information Hiding an Annotated Bibliography

There are a number of application areas in which we want to hide information or to stop someone else from doing so. These include steganography, copyright marking, the study of covert channels in operating systems, lowprobability-of-intercept communications, and the study of subliminal channels in digital signature schemes. There follow abstracts of material from number of relevant publications...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer and System Sciences

سال: 1989

ISSN: 0022-0000

DOI: 10.1016/0022-0000(89)90018-4