Deniable-encryption protocol using commutative Transformation
Articolul precedent
Articolul urmator
641 13
Ultima descărcare din IBN:
2021-04-21 16:01
SM ISO690:2012
MOLDOVYAN, Nikolay; MOLDOVYAN, Alexandr; SHCHERBACOV, Alexei. Deniable-encryption protocol using commutative Transformation. In: Conference on Mathematical Foundations of Informatics. 25-30 iulie 2016, Chișinău. Chișinău, Republica Moldova: "VALINEX" SRL, 2016, pp. 285-298. ISBN 978‐9975‐4237‐4‐8.
EXPORT metadate:
Google Scholar

Dublin Core
Conference on Mathematical Foundations of Informatics 2016
Conferința "Conference on Mathematical Foundations of Informatics"
2016, Chișinău, Moldova, 25-30 iulie 2016

Deniable-encryption protocol using commutative Transformation

MSC 2010: 94A60, 11S05

Pag. 285-298

Moldovyan Nikolay1, Moldovyan Alexandr1, Shcherbacov Alexei2
1 St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences,
2 Liceul Teoretic „C.Sibirschii” din Chişinău
Disponibil în IBN: 30 martie 2018


It is proposed a new design of the deniable-encryption protocols, which is based on using commutative transformation of messages sent between two parties of communication session. For performing the data encryption there is used a shared key having small size (16 to 56 bits), high security and bi-deniability of the protocol being provided though. The protocol has sufficiently high performance and resists active coercive attacks due to using the shared key. It is designed so that data send via insecure channel during the protocol cannot be used to compute any information about the shared key and the deniable encryption is computationally indistinguishable from probabilistic encryption.

cryptography, encryption, commutative encryption, deniable encryption, shared key, probabilistic encryption