Partial Hiding in Public-Key Cryptography

نویسندگان

  • Eabhnat Ní Fhloinn
  • Michael Purser
چکیده

This paper explores the idea of exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers, such as RSA. While substantial work has been done in the area of partial key exposure, the aim has been to investigate the implications of inadvertant partial exposure of the private key. We focus instead on the potential advantages of deliberately revealing portions of the private key, and so, term our scheme “partial hiding”. Significant segments of the key are made publicly available, greatly reducing the amount of data which must be securely hidden. This allows us to use biometric readings to protect the secret portion of the private key. We use iris recognition with error-correcting codes for this purpose. We propose an implementation of this system for RSA, and consider the potential risks and advantages of such a scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the...

متن کامل

Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting

In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE) in a public key setting, which we call inner product encryption with ciphertext conversion (IPE-CC), where original ciphertexts are converted to predicate-searchable ones by an helper in possession of a conversion key. We then define a notion of full security for IPE-CC, which comprises three se...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions

A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A public physically unclonable function (PPUF) is a PUF that is created so that its simulation is feasible but requires very large time even when ample computational resources are available. Using PPUFs, we have developed conceptually...

متن کامل

On the limits of steganography

In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches—many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a num...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005