摘要:
A secure solution is provided to the problem of secret key agreement. In particular, a method of reliable forward secret key sharing is disclosed between two legitimate correspondents whose profiles match sufficiently. The invention relies on a physical random function, sometimes referred to as a physical unclonable function (PUF) to provide a secure solution to the problem of secret key agreement. In one embodiment, a one-pass protocol is introduced based on Reed-Solomon codes leading to an unconditionally secure solution. In a further embodiment, the solution of the first embodiment is improved upon by providing a conditionally secure solution based on a pseudo random family of functions. In a still further embodiment, a two-pass protocol is introduced which is used exclusively for purposes of identification and authentication. In accordance with the principles of the two-pass protocol, two communications are required and unlike the one-pass protocol, the second correspondent selects the secret key K.
摘要:
A system for visual cryptography comprises a server (1) for encrypting a series of images using a set of keys, a terminal (2) for displaying the encrypted images, a transmission medium (4) for transmitting the encrypting images from the server to the terminal (2), and a decryption device (3) for decrypting the encrypted image displayed on the terminal. A key identification is produced by the server (1) and displayed by the terminal (2). The decryption device (3) senses the key identification and selects the corresponding key from its key set.
摘要:
The invention relates to an apparatus for reading out information from an information carrier, the information including at least a first signal of at least partly encrypted content, to an apparatus for storing such information as well as to corresponding methods. The invention proposes a realisation of the Content Scrambling System (CSS) rule: CSS encrypted content on a recordable disc should be refused. In order to be able to use a wobbled disc for distinguishing ROM-discs from recordable discs, it is required that in the content on 'new' discs there will be a 'wobble-trigger'. This trigger has the following requirements: it should be easily detectable from looking just at the content, it should not be easily removable by a hacker, it should not affect content preparation. It is thus proposed according to the invention that an apparatus for reading out information comprises: means for detecting a second signal logically embedded in the first signal, means for detecting a physical mark used for storing at least part of the information on the information carrier, and means for refusing play back of the information read from the information carrier if a second signal but no physical mark has been detected.
摘要:
Multiword information is based on multibit symbols disposed in relative contiguity with respect to a medium, and is encoded with a wordwise interleaving and wordwise error protection code for providing error locative clues across multiword groups. In particular, the clues originate in high protectivity clue words (BIS) that are interleaved among clue columns, and also in synchronizing columns constituted from synchronizing bit groups. The synchronizing columns are located where the clue columns are relatively scarcer disposed. The clues are directed to low protectivity target words (LDS) that are interleaved in a substantially uniform manner among target columns which form uniform-sized column groups between periodic arrangements of clue columns and synchronizing columns.
摘要:
The present invention relates to a method and a system of securely computing a measure of similarity for at least two sets of data. A basic idea of the present invention is to securely compare two sets of encrypted data to determine whether the two sets of data resemble each other to a sufficient extent. If the measure of similarity complies with predetermined criteria, the two sets of data from which the encrypted sets of data originate are considered to be identical.
摘要:
The present invention relates to a method of embedding an additional layer of error correction into an error correcting code, wherein information is encoded into code words of said code over a first Galois field and wherein a number of code words are arranged in the columns of a code block comprising a user data sub-block and a parity data sub-block. In order to provide an additional layer of error correction that can be easily implemented without losing compatibility improving the error correction capabilities, a method is proposed comprising the steps of: - encoding the rows of at least said user data sub-block separately or in groups using a horizontal error correcting code over a second Galois field larger than said first Galois field to obtain horizontal parities, - embedding said horizontal parities as additional layer in said error correcting code.
摘要:
Information signals such as grayscale images or audio signals are represented as a sequence of PCM signal samples. To embed auxiliary data in the least significant bits of the signal, the samples are slightly distorted. There is a so-termed 'rate-distortion function' (20) which gives the largest embedding rate R given a certain distortion level D. It appears that the efficiency of prior art embedding schemes such as LSB replacement (21,22) can be improved. The invention discloses such embedding schemes (23,24). According to the invention, the signal is divided into groups of L (L>1) signal samples (x). For each group of signal samples, a vector of least significant portions (x mod n) of the signal samples is created. For n=2, the vector comprises the least significant bit of each signal sample. The syndrome of said vector (as defined in the field of error detection and correction) represents the embedded data. Only one (or a few, in any case less than L) signal sample(s) of a group needs to be modified so as to achieve that the vector assumes a desired syndrome value.
摘要:
The invention relates to a method of decoding a stream of channel bits of a signal relating to a binary channel (21, 30) into a stream of source bits of a signal relating to a binary source (40). This binary channel comprises a main channel (21) and a secondary channel (30). This secondary channel is embedded in the main channel. In order to correct errors in the stream of secondary channel bits a stream of corrected main channel bits is used. This stream of corrected main channel bits is reconstructed from a stream of corrected source bits (25). The secondary channel can be embedded in the main channel in different manners, e.g. via multi-level coding or via merging-bit coding. The invention further relates to a device for decoding.
摘要:
A method of secure transmission and reception of a message from a user. An image (320) representing a plurality of input means, e.g. an image of a keypad, is generated and encoded. The image is encoded using visual cryptography using a key sequence stored in a decryption device (310) as randomization. The randomized image is transmitted to the client device (301), where it is displayed on a first display (501) .The randomization is displayed on a second display (311) .Superimposing the first and second displays reveals the image. The client device (301) allows the user to select particular spots on the first display (501) that correspond to the location of particular input means on the reconstructed image. The coordinates of these spots are transmitted back to the server (300), which can translate them to the particular input means selected by the user. The message is then constructed as the input symbol represented by the particular input means.
摘要:
A method for generating a common secret data item between a first user facility and a second user facility does so through by each user facility executing mutually symmetric operations on respective complementary data items that are based on respectively unique quantities and that are at least in part secret. An outcome of the operations is used in both said user facilities as said common secret data item. In particular, the method is based on defining the complementary data belonging to a GAP Diffie-Hellmann Problem that is defined in an Abelian Variety. More in particular, the Abelian Variety has a dimension one through being an elliptic curve.