Method for securely detecting hidden text information based on homomorphic encryption system

A homomorphic encryption, text information technology, applied in the field of information security, can solve the problems of no private data leakage, lack of trust or emphasis on privacy protection

Inactive Publication Date: 2013-02-13
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a text information hiding security detection method based on a homomorphic encryption system, which solves the detection of hidden information without private data leakage between the detection service provider and the service user that lacks trust or emphasizes privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securely detecting hidden text information based on homomorphic encryption system
  • Method for securely detecting hidden text information based on homomorphic encryption system
  • Method for securely detecting hidden text information based on homomorphic encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The above solution will be further described below in conjunction with specific embodiments. It should be understood that these examples are used to illustrate the present invention and not to limit the scope of the present invention. The implementation conditions used in the examples can be further adjusted according to the conditions of specific manufacturers, and the implementation conditions not indicated are usually the conditions in routine experiments.

[0040] Implementation of text information hiding safety detection in the embodiment

[0041] The security detection method for text information hiding in this embodiment utilizes a security transformation process based on a homomorphic encryption system [Pascal Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", EUROCRYPT'99] to perform an equivalent transformation on the sample variance , so that the detection service provider Alice and the service user Bob share the variance of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for securely detecting hidden text information based on a homomorphic encryption system, and the method is used for a service provider to detect the hidden text information of a service user. The method comprises the following steps: the service provider and the service user which are mutually independent transfer non-private information interactively so as to complete the detection on the hidden text information; and then, according to the comparand of the service provider and the service user, the two parties judge whether the text information contains hidden information by utilizing the homomorphic encryption system and an executive safety comparison protocol. By using the method, the detection on the hidden text information can be performed between twoindependent parties which are lack of mutual trust.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a text information hiding security detection method based on a homomorphic encryption system. Background technique [0002] The text information hiding method can embed secret information in the text carrier, and the new text obtained after embedding the secret information is called generated text. Using the method of generating text to transmit information secretly can achieve the purpose of hiding communication channels and evading monitoring. In contrast, the purpose of the text information hiding detection method is to detect whether the text contains hidden information, and to distinguish the generated text containing hidden information from normal text. [0003] In natural language, normal text has many inherent statistical properties that cannot be found in generated text. For normal text, there is often a strong correlation between words in each...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCH04L9/008
Inventor 朱友文黄刘生杨威陈志立
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products