No-key protocol for deniable encryption
Închide
Articolul precedent
Articolul urmator
464 0
SM ISO690:2012
, , , , SHCHERBACOV, Alexei. No-key protocol for deniable encryption. In: Advances in Intelligent Systems and Computing, 15-17 iunie 2017, Da Nang. Dusseldorf, Germania: Springer Verlag, 2018, Ediția a 4-a, Vol. 672, p. 0. ISBN 978-981107511-7. DOI: https://doi.org/10.1007/978-981-10-7512-4_10
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Advances in Intelligent Systems and Computing
Ediția a 4-a, Vol. 672, 2018
Conferința "4th International Conference on Information Systems Design and Intelligent Applications"
Da Nang, Vietnam, 15-17 iunie 2017

No-key protocol for deniable encryption

DOI:https://doi.org/10.1007/978-981-10-7512-4_10

Pag. 0-0

1, 2, Shcherbacov Alexei3, 1
 
1 Academy of Cryptography Techniques, Hanoi,
2 St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences,
3 Institute of Mathematics and Computer Science ASM
 
 
Disponibil în IBN: 27 august 2021


Rezumat

There is proposed a new method for deniable encryption based on commutative transformations. The method has been used to design the deniable encryption protocol resistant to the passive coercive attacks, which uses no pre-shared secret keys and no pre-exchanged public keys. The protocol begins with the stage at which the sender and receiver exchange their single-use public keys and compute the single-use shared secret key. Then, it is performed pseudo-probabilistic three-pass protocol with simultaneous commutative encryption of the fake and secret messages. Resistance of the proposed protocol to coercive attacks is provided by its computational indistinguishability from probabilistic no-key three-pass protocol used to send securely the fake message. To perform commutative encryption, it used exponentiation cipher. To provide security against active coercer, the protocol is to be complemented with procedure for authenticating the sent messages.

Cuvinte-cheie
access control, information systems, Information use, systems analysis