Efficient Verifiable Image Redacting based on zk-SNARKs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ko, Hankyung | - |
dc.contributor.author | Lee, Ingeun | - |
dc.contributor.author | Lee, Seunghwa | - |
dc.contributor.author | Kim, Jihye | - |
dc.contributor.author | Oh, Hyunok | - |
dc.date.accessioned | 2021-07-30T04:43:52Z | - |
dc.date.available | 2021-07-30T04:43:52Z | - |
dc.date.created | 2021-07-14 | - |
dc.date.issued | 2021-05 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/1134 | - |
dc.description.abstract | Image is a visual representation of a certain fact and can be used as proof of events. As the utilization of the image increases, it is required to prove its authenticity with the protection of its sensitive personal information. In this paper, we propose a new efficient verifiable image redacting scheme based on zk-SNARKs, a commitment, and a digital signature scheme. We adopt a commit-and-prove SNARK scheme which takes commitments as inputs, in which the authenticity can be quickly verified outside the circuit. We also specify relations between the original and redacted images to guarantee the redacting correctness. Our experimental results show that the proposed scheme is superior to the existing works in terms of the key size and proving time without sacrificing the other parameters. The security of the proposed scheme is proven formally. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinery, Inc | - |
dc.title | Efficient Verifiable Image Redacting based on zk-SNARKs | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Oh, Hyunok | - |
dc.identifier.doi | 10.1145/3433210.3453110 | - |
dc.identifier.scopusid | 2-s2.0-85108057803 | - |
dc.identifier.bibliographicCitation | ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, pp.213 - 226 | - |
dc.relation.isPartOf | ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | - |
dc.citation.title | ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | - |
dc.citation.startPage | 213 | - |
dc.citation.endPage | 226 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Computer science | - |
dc.subject.keywordPlus | Computers | - |
dc.subject.keywordPlus | Digital signature schemes | - |
dc.subject.keywordPlus | Key sizes | - |
dc.subject.keywordPlus | Personal information | - |
dc.subject.keywordPlus | Visual representations | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordAuthor | filtering | - |
dc.subject.keywordAuthor | image authentication | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | zk-SNARK | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3433210.3453110 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.