Please use this identifier to cite or link to this item: https://doi.org/10.1145/1866870.1866876
DC FieldValue
dc.titleA chameleon encryption scheme resistant to known-plaintext attack
dc.contributor.authorChang, E.-C.
dc.contributor.authorFang, C.
dc.contributor.authorXu, J.
dc.date.accessioned2013-07-04T08:27:25Z
dc.date.available2013-07-04T08:27:25Z
dc.date.issued2010
dc.identifier.citationChang, E.-C., Fang, C., Xu, J. (2010). A chameleon encryption scheme resistant to known-plaintext attack. Proceedings of the ACM Conference on Computer and Communications Security : 25-34. ScholarBank@NUS Repository. https://doi.org/10.1145/1866870.1866876
dc.identifier.isbn9781450300919
dc.identifier.issn15437221
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/41432
dc.description.abstractFrom a ciphertext and a secret key assigned to a user, the decryption of a Chameleon encryption scheme produces a message which is the plaintext embedded with a watermark associated to the user. Most existing constructions of Chameleon encryption scheme are LUT (lookup table)-based, where a secret LUT plays the role of the master key and each user has a noisy version of the secret LUT. LUT-based methods have the limitation that the secrecy of the master key, under known-plaintext attack (KPA), relies on the difficulty in solving large linear system. In other words, with some knowledge of the plaintext, a dishonest user is able to derive the LUT, or an approximation of the LUT by solving a linear system. Resistance to such attack is crucial in the context of multimedia encryption since multimedia objects inherently contain high redundancies. Furthermore, for efficiency in decryption, the underlying linear system is likely to be sparse or not overly large, and hence can be solved using reasonable computing resource. In our experiment, a desktop PC is able to find a LUT (with 2 16 entries) within 2 hours. We propose a scheme that is resistant to KPA. The core of the scheme is a MUTABLE-PRNG (Pseudo Random Number Generator) whereby different but similar sequences are generated from related seeds. We generate such sequence from multiple pseudo random sequences based on majority-vote, and enhance its performance using error-correcting code. The proposed scheme is very simple and it is easy to show that it is resistant to KPA under reasonable cryptographic assumptions. However, it is not clear how much information on the original plaintext is leaked from the watermarked copies. We analyze the scheme and quantify the information loss using average conditional entropy. © 2010 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1866870.1866876
dc.sourceScopus
dc.subjectchameleon encryption
dc.subjectclient-side watermark embedding
dc.subjectknown-plaintext attack
dc.subjectmutable-prng
dc.typeConference Paper
dc.contributor.departmentCOMPUTATIONAL SCIENCE
dc.description.doi10.1145/1866870.1866876
dc.description.sourcetitleProceedings of the ACM Conference on Computer and Communications Security
dc.description.page25-34
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.