Authenticating Encrypted Data

Free registration required

Executive Summary

Traditionally Message Authentication Codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper, the authors propose to integrate the two in a framework where the parameterized hash value of an encrypted image is designed to be the same as the hash value of the parent unencrypted original image. This form of privacy preserving authentication has applications in database searches containing sensitive files such as sets of patient's X-ray records.

  • Format: PDF
  • Size: 506.74 KB