Function Hiding Based on Error Correcting Codes

نویسندگان

  • Sergio Loureiro
  • Refik Molva
چکیده

1. Supported by FCT grant PRAXIS XXI/BD/13875/97 Abstract This paper presents an original approach to the problem of function hiding based on Error Correcting Codes and evaluates the security of this approach. The novelty of the technique consists in using Error Correcting Codes to hide functions instead of encrypting data vectors. This protocol mainly deals with the issue of secure evaluation of functions in potentially hostile environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery

In this paper, reversible data-hiding (RDH) systems with modified fluctuation functions and rate-matched Reed–Solomon (RS) codes are proposed to enhance the data recovery from encrypted images. The modified fluctuation functions are used for estimating embedded codeword bits from the correlation of pixels. Instead of direct data-bit embedding, codeword bits of RS codes are embedded by a data-hi...

متن کامل

One-point Goppa Codes on Some Genus 3 Curves with Applications in Quantum Error-Correcting Codes

We investigate one-point algebraic geometric codes CL(D, G) associated to maximal curves recently characterized by Tafazolian and Torres given by the affine equation yl = f(x), where f(x) is a separable polynomial of degree r relatively prime to l. We mainly focus on the curve y4 = x3 +x and Picard curves given by the equations y3 = x4-x and y3 = x4 -1. As a result, we obtain exact value of min...

متن کامل

An approach to fault detection and correction in design of systems using of Turbo ‎codes‎

We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...

متن کامل

Mobile Code Protection with Smartcards Position Paper

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The sec...

متن کامل

Mobile Code Protection with Smartcards

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999