Articolul precedent |
Articolul urmator |
846 13 |
Ultima descărcare din IBN: 2021-04-21 16:01 |
SM ISO690:2012 MOLDOVYAN, Nikolay, MOLDOVYAN, Alexandr, SHCHERBACOV, Alexei. Deniable-encryption protocol using commutative Transformation. In: Conference on Mathematical Foundations of Informatics, Ed. 2016, 25-30 iulie 2016, Chișinău. Chișinău, Republica Moldova: "VALINEX" SRL, 2016, pp. 285-298. ISBN 978‐9975‐4237‐4‐8. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Conference on Mathematical Foundations of Informatics 2016 | |||||
Conferința "Conference on Mathematical Foundations of Informatics" 2016, Chișinău, Moldova, 25-30 iulie 2016 | |||||
|
|||||
MSC 2010: 94A60, 11S05 | |||||
Pag. 285-298 | |||||
|
|||||
Descarcă PDF | |||||
Rezumat | |||||
It is proposed a new design of the deniable-encryption protocols, which is based on using commutative transformation of messages sent between two parties of communication session. For performing the data encryption there is used a shared key having small size (16 to 56 bits), high security and bi-deniability of the protocol being provided though. The protocol has sufficiently high performance and resists active coercive attacks due to using the shared key. It is designed so that data send via insecure channel during the protocol cannot be used to compute any information about the shared key and the deniable encryption is computationally indistinguishable from probabilistic encryption. |
|||||
Cuvinte-cheie cryptography, encryption, commutative encryption, deniable encryption, shared key, probabilistic encryption |
|||||
|
Crossref XML Export
<?xml version='1.0' encoding='utf-8'?> <doi_batch version='4.3.7' xmlns='http://www.crossref.org/schema/4.3.7' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd'> <head> <doi_batch_id>ibn-60809</doi_batch_id> <timestamp>1711652049</timestamp> <depositor> <depositor_name>Information Society Development Instiute, Republic of Moldova</depositor_name> <email_address>idsi@asm.md</email_address> </depositor> </head> <body> <collection> <collection_metadata> <full_title>Conference on Mathematical Foundations of Informatics</full_title> </collection_metadata> <collection_issue> <publication_date media_type='print'> <year>2016</year> </publication_date> <isbn>978‐9975‐4237‐4‐8</isbn> </collection_issue> <collection_article publication_type='full_text'><titles> <title>Deniable-encryption protocol using commutative Transformation</title> </titles> <contributors> <person_name sequence='first' contributor_role='author'> <given_name>Nikolay</given_name> <surname>Moldovyan</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Alexandr</given_name> <surname>Moldovyan</surname> </person_name> <person_name sequence='additional' contributor_role='author'> <given_name>Alexei</given_name> <surname>Şcerbacov</surname> </person_name> </contributors> <publication_date media_type='print'> <year>2016</year> </publication_date> <pages> <first_page>285</first_page> <last_page>298</last_page> </pages> </collection_article> </collection> </body> </doi_batch>