基于Kyber交换加密水印算法设计
Design of Exchange Encryption Watermarking Algorithm Based on Kyber
DOI: 10.12677/sea.2025.144072, PDF,    国家自然科学基金支持
作者: 蒋 雪, 吕经浪, 李子臣:北京印刷学院信息工程学院,北京
关键词: Kyber算法同态加密数字水印交换加密水印Kyber Algorithm Homomorphic Encryption Digital Watermark Exchange Encrypted Watermarks
摘要: 随着量子计算的迅速发展,传统的同态加密水印算法面临着安全威胁。本文提出了一种基于Kyber密文域同态加密水印算法。通过将Kyber加密算法与Patchwork水印算法相结合,确保信息在传输时不被泄露,同时实现加密与水印嵌入运算先后顺序的交换。实验结果表明,该算法确保了水印嵌入与数据加密的顺序不影响密文数据的生成和水印提取,不仅在密文域可以提取水印,解密后也可以提取水印。
Abstract: The rapid development of quantum computing, traditional homomorphic encryption watermark algorithms face security threats. This paper proposes a watermark algorithm based on Kyber ciphertext domain homomorphic exchange encryption. By combining Kyber encryption with Patchwork watermark algorithm, we ensure that information is not leaked during transmission, and at the same time, the order of encryption and watermark embedding operations is exchanged. Experimental results show that the algorithm ensures that the order of watermark embedding and data encryption does not affect the generation and watermark extraction of ciphertext data. Not only can the watermark be extracted in the ciphertext domain, but the watermark can also be extracted after decryption.
文章引用:蒋雪, 吕经浪, 李子臣. 基于Kyber交换加密水印算法设计[J]. 软件工程与应用, 2025, 14(4): 821-831. https://doi.org/10.12677/sea.2025.144072

参考文献

[1] 赵学军, 曹天宇, 李琳. 数字图像水印综述[J]. 工业控制计算机, 2025, 38(1): 108-110.
[2] Li, H., Yang, Y., Dai, Y., Yu, S. and Xiang, Y. (2020) Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data. IEEE Transactions on Cloud Computing, 8, 484-494. [Google Scholar] [CrossRef
[3] Olaiya, O.P., Adesoga, T.O., Adebayo, A.A., et al. (2024) Encryption Techniques for Financial Data Security in Fintech Applications. International Journal of Science and Research Archive, 12, 2942-2949. [Google Scholar] [CrossRef
[4] Marcolla, C., Sucasas, V., Manzano, M., et al. (2022) Survey on Fully Homomorphic Encryption, Theory, and Applications. Proceedings of the IEEE, 110, 1572-1609.
[5] Mahato, G.K. and Chakraborty, S.K. (2021) A Comparative Review on Homomorphic Encryption for Cloud Security. IETE Journal of Research, 69, 5124-5133. [Google Scholar] [CrossRef
[6] Bernstein, D.J. and Lange, T. (2017) Post-Quantum Cryptography. Nature, 549, 188-194. [Google Scholar] [CrossRef] [PubMed]
[7] Liang, X., Xiang, S., Yang, L. and Li, J. (2021) Robust and Reversible Image Watermarking in Homomorphic Encrypted Domain. Signal Processing: Image Communication, 99, Article ID: 116462. [Google Scholar] [CrossRef
[8] Pillai, S.E.V.S. and Polimetla, K. (2024) Analyzing the Impact of Quantum Cryptography on Network Security. 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), Raichur, 23-24 February 2024, 1-6. [Google Scholar] [CrossRef
[9] Azhari, R. and Salsabila, A.N. (2024) Analyzing the Impact of Quantum Computing on Current Encryption Techniques. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 5, 148-157. [Google Scholar] [CrossRef
[10] Jiang, L. (2018) The Identical Operands Commutative Encryption and Watermarking Based on Homomorphism. Multimedia Tools and Applications, 77, 30575-30594. [Google Scholar] [CrossRef
[11] Ren, N., Tong, D., Cui, H., Zhu, C. and Zhou, Q. (2022) Congruence and Geometric Feature-Based Commutative Encryption-Watermarking Method for Vector Maps. Computers & Geosciences, 159, Article ID: 105009. [Google Scholar] [CrossRef
[12] 吕经浪, 李子臣. 基于Kyber的小数加法同态密码体制的研究[J]. 计算机技术与发展, 2024, 34(11): 101-108.
[13] Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., et al. (2018). CRYSTALS-Kyber: A CCA-Secure Module-Lattice-Based KEM. 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, 24-26 April 2018, 353-367.[CrossRef
[14] Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996) Techniques for Data Hiding. IBM Systems Journal, 35, 313-336. [Google Scholar] [CrossRef
[15] Jiang, L., Xu, Z. and Xu, Y. (2012) Commutative Encryption and Watermarking Based on Orthogonal Decomposition. Multimedia Tools and Applications, 70, 1617-1635. [Google Scholar] [CrossRef
[16] 方立娇, 李子臣, 丁海洋. 基于ElGamal的同态交换加密水印算法[J]. 计算机系统应用, 2021, 30(5): 234-240.
[17] 项世军, 罗欣荣, 石书协. 一种同态加密域图像可逆水印算法[J]. 计算机学报, 2016, 39(3): 571-581.