...
首页> 外文期刊>Journal of Mobile, Embedded and Distributed Systems >On the Security of Black-Box Implementation of Visual Secret Sharing Schemes
【24h】

On the Security of Black-Box Implementation of Visual Secret Sharing Schemes

机译:论视觉秘密共享方案的黑盒实现的安全性

获取原文

摘要

Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However, this implies that the users must totally trust the manufacturer and the authenticity of the device or software they use. Young and Yung were the first to question the correctness of the manufacturer and considered the advantage that a malicious implementation could offer to a specific attacker. In this paper, we consider a modified version of two visual secret sharing schemes and the advantage that they provide to the attacker in order to reconstruct the secret by himself, while the other participants must fulfill the honest scheme reconstruction conditions. We also analyze the security of the proposed mechanisms and the conditions in which they can be applicable.
机译:加密软件和设备使用户能够更轻松地利用加密的优势。但是,这意味着用户必须完全信任制造商以及他们使用的设备或软件的真实性。 Young和Yung率先质疑制造商的正确性,并考虑了恶意实施可为特定攻击者提供的优势。在本文中,我们考虑了两种视觉秘密共享方案的修改版本,以及它们提供给攻击者以自己重建秘密的优势,而其他参与者必须满足诚实的方案重建条件。我们还分析了所提出机制的安全性和适用条件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号