Partial Hiding in Public-Key Cryptography
نویسندگان
چکیده
This paper explores the idea of exposing sections of the private key in public-key cryptosystems whose security is based on the intractability of factorising large integers, such as RSA. While substantial work has been done in the area of partial key exposure, the aim has been to investigate the implications of inadvertant partial exposure of the private key. We focus instead on the potential advantages of deliberately revealing portions of the private key, and so, term our scheme “partial hiding”. Significant segments of the key are made publicly available, greatly reducing the amount of data which must be securely hidden. This allows us to use biometric readings to protect the secret portion of the private key. We use iris recognition with error-correcting codes for this purpose. We propose an implementation of this system for RSA, and consider the potential risks and advantages of such a scheme.
منابع مشابه
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography
We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the...
متن کاملPredicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE) in a public key setting, which we call inner product encryption with ciphertext conversion (IPE-CC), where original ciphertexts are converted to predicate-searchable ones by an helper in possession of a conversion key. We then define a notion of full security for IPE-CC, which comprises three se...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملHardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A public physically unclonable function (PPUF) is a PUF that is created so that its simulation is feasible but requires very large time even when ample computational resources are available. Using PPUFs, we have developed conceptually...
متن کاملOn the limits of steganography
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches—many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a num...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005