• DocumentCode
    825257
  • Title

    On Fundamental Limitations of Proving Data Theft

  • Author

    Young, Adam L. ; Yung, Moti M.

  • Author_Institution
    Cryptovirology Labs., Sterling, VA
  • Volume
    1
  • Issue
    4
  • fYear
    2006
  • Firstpage
    524
  • Lastpage
    531
  • Abstract
    We show software agents that operate on input plaintext, transmit the result, and have the property that characterizes the operation as theft of plaintext amounts to solving a hard cryptographic problem. Such agents employ what we call a "questionable encryption scheme" in which it is computationally intractable to determine if the output is an asymmetric ciphertext or nonce. We therefore show a fundamental computational limitation of information forensics
  • Keywords
    cryptography; software agents; asymmetric ciphertext; cryptographic problem; data theft proving; information forensics; input plaintext; questionable encryption scheme; software agents; Application software; Data security; Failure analysis; Forensics; Information security; Public key; Public key cryptography; Software agents; Software design; All-or-nothing disclosure; decision $n$th degree composite residuosity; paillier cryptosystem; public key cryptosystem (PKCS); questionable encryption; semantic security;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2006.885025
  • Filename
    4014112