Hiding information and signatures in trapdoor knapsacks
نویسندگان
چکیده
Compressibiity of individuai sequences by the ciam of gener-aihd finite-atate information-losales encoders ia investigated These en-codersrpnoperateinavariabie-ratemodeasweUasaflxedrateone,nndthey aiiow for any fhite-atate acheme of variabie-iength-to-variable-ien@coding. For every individuai hfiite aeqence x a quantity p (x) ia defined,calledthecompressibilityofx,whirhisshowntobetheasymptotieatlyattainable lower bound on the compression ratio tbat cao be achieved for xby any finite-state encoder. ‘flds is demonstrated by means of a amatruc-tivecodtngtbeoremanditsconversethat,apartfnnntheirafymptoticsignificance, also provide useful performance criteria for finite and practi-cai data-compression taaka. The proposed concept of compressibility ia aiaoshown to play a role analogous to that of entropy in ciaasicai informatfontheory where onedeaia with probabilistic ensembles of aequencea ratk Manuscript received June 10, 1977; revised February 20, 1978.J. Ziv is with Bell Laboratories, Murray Hill, NJ 07974, on leave fromthe Department of Electrical Engineering, Techmon-Israel Institute ofTechnology, Halfa, Israel.A. Lempel is with Sperry Research Center, Sudbury, MA 01776, onleave from the Department of Electrical Engineer@, Technion-IsraelInstitute of Technology, Haifa, Israel.tium with individuai sequences. Widie the delinition of p (x) aiiows adifferent machine for each different sequence to be compresse4 theconstructive coding theorem ieada to a universal algorithm that is aaymiktoticaiiy optfmai for au sequencea.
منابع مشابه
On the Lossiness of the Rabin Trapdoor Function
Lossy trapdoor functions, introduced by Peikert and Waters (STOC ’08), are functions that can be generated in two indistinguishable ways: either the function is injective, and there is a trapdoor to invert it, or the function is lossy, meaning that the size of its range is strictly smaller than the size of its domain. Kakvi and Kiltz (EUROCRYPT 2012) proved that the Full Domain Hash signature s...
متن کاملTrapdoorSanitizable Signatures and Their Application to Content Protection
Sanitizable signatures allow a designated entity to modify some specific parts of a signed message and to produce a new signature of the resulting message without any interaction with the original signer. In this paper, we extend these sanitizable signatures to formally introduce trapdoor sanitizable signatures. In this concept, the power of sanitization is given to possibly several entities, f...
متن کاملRelaxed Security Notions for Signatures of Knowledge
We revisit the definition of signatures of knowledge by Chase and Lysanskaya (Crypto 2006) which correspond to regular signatures but where the signer also proves knowledge of the secret key to the public key through any signature. From a more abstract point of view, the signer holds a secret witness w to a public NP statement x and any signature to a message allows to extract w given some auxi...
متن کاملUniversal Undeniable Signatures
In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algorithms can be used. Our mechanism is that any verifier without trapdoor information cannot distinguish whether a message is encoded from Diffie-Hellamn resource D or random resource R while a signer with trapdoor information ca...
متن کاملSecurity of Blind Digital
Blind digital signatures were introduced by Chaum. In this paper, we show how security and blindness properties for blind digital signatures, can be simultaneously deened and satissed, assuming an arbitrary one-way trapdoor permutation family. Thus, this paper presents the rst complexity-based proof of security for blind signatures.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. Information Theory
دوره 24 شماره
صفحات -
تاریخ انتشار 1978