Bi-deniable public-encryption protocols based on standard PKI
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure..
Medienart: |
E-Artikel |
---|
Erscheinungsjahr: |
2016 |
---|---|
Erschienen: |
2016 |
Enthalten in: |
Zur Gesamtaufnahme - volume:664 |
---|---|
Enthalten in: |
Proceedings of the XXth Conference of Open Innovations Association FRUCT - 664(2016), 18, Seite 212-219 |
Sprache: |
Englisch |
---|
Beteiligte Personen: |
Nikolay Moldovyan [VerfasserIn] |
---|
Links: |
doi.org [kostenfrei] |
---|
Themen: |
Authentication |
---|
doi: |
10.1109/FRUCT-ISPIT.2016.7561530 |
---|
funding: |
|
---|---|
Förderinstitution / Projekttitel: |
|
PPN (Katalog-ID): |
DOAJ059519789 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ059519789 | ||
003 | DE-627 | ||
005 | 20230502062453.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/FRUCT-ISPIT.2016.7561530 |2 doi | |
035 | |a (DE-627)DOAJ059519789 | ||
035 | |a (DE-599)DOAJ84998ddc8d414fc3b9b558ca43735ce0 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK5101-6720 | |
100 | 0 | |a Nikolay Moldovyan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Bi-deniable public-encryption protocols based on standard PKI |
264 | 1 | |c 2016 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure. | ||
650 | 4 | |a cryptographic protocol | |
650 | 4 | |a deniable encryption | |
650 | 4 | |a public encryption | |
650 | 4 | |a bi-deniability | |
650 | 4 | |a authentication | |
650 | 4 | |a digital signature | |
650 | 4 | |a fake message | |
650 | 4 | |a public key | |
650 | 4 | |a shared key | |
650 | 4 | |a public key infrastructure | |
653 | 0 | |a Telecommunication | |
700 | 0 | |a Andrey Berezin |e verfasserin |4 aut | |
700 | 0 | |a Anatoly Kornienko |e verfasserin |4 aut | |
700 | 0 | |a Alexander Moldovyan |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Proceedings of the XXth Conference of Open Innovations Association FRUCT |d FRUCT, 2017 |g 664(2016), 18, Seite 212-219 |w (DE-627)DOAJ000063177 |x 23430737 |7 nnns |
773 | 1 | 8 | |g volume:664 |g year:2016 |g number:18 |g pages:212-219 |
856 | 4 | 0 | |u https://doi.org/10.1109/FRUCT-ISPIT.2016.7561530 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/84998ddc8d414fc3b9b558ca43735ce0 |z kostenfrei |
856 | 4 | 0 | |u https://fruct.org/publications/fruct18/files/Mol.pdf |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2305-7254 |y Journal toc |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2343-0737 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a SSG-OLC-PHA | ||
951 | |a AR | ||
952 | |d 664 |j 2016 |e 18 |h 212-219 |