Deniable-encryption protocol using commutative Transformation
Închide
Articolul precedent
Articolul urmator
846 13
Ultima descărcare din IBN:
2021-04-21 16:01
SM ISO690:2012
MOLDOVYAN, Nikolay, MOLDOVYAN, Alexandr, SHCHERBACOV, Alexei. Deniable-encryption protocol using commutative Transformation. In: Conference on Mathematical Foundations of Informatics, Ed. 2016, 25-30 iulie 2016, Chișinău. Chișinău, Republica Moldova: "VALINEX" SRL, 2016, pp. 285-298. ISBN 978‐9975‐4237‐4‐8.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Conference on Mathematical Foundations of Informatics 2016
Conferința "Conference on Mathematical Foundations of Informatics"
2016, Chișinău, Moldova, 25-30 iulie 2016

Deniable-encryption protocol using commutative Transformation

MSC 2010: 94A60, 11S05

Pag. 285-298

Moldovyan Nikolay1, Moldovyan Alexandr1, Shcherbacov Alexei2
 
1 St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences,
2 Liceul Teoretic „C.Sibirschii” din Chişinău
 
Disponibil în IBN: 30 martie 2018


Rezumat

It is proposed a new design of the deniable-encryption protocols, which is based on using commutative transformation of messages sent between two parties of communication session. For performing the data encryption there is used a shared key having small size (16 to 56 bits), high security and bi-deniability of the protocol being provided though. The protocol has sufficiently high performance and resists active coercive attacks due to using the shared key. It is designed so that data send via insecure channel during the protocol cannot be used to compute any information about the shared key and the deniable encryption is computationally indistinguishable from probabilistic encryption.

Cuvinte-cheie
cryptography, encryption, commutative encryption, deniable encryption, shared key, probabilistic encryption

Crossref XML Export

<?xml version='1.0' encoding='utf-8'?>
<doi_batch version='4.3.7' xmlns='http://www.crossref.org/schema/4.3.7' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd'>
<head>
<doi_batch_id>ibn-60809</doi_batch_id>
<timestamp>1711652049</timestamp>
<depositor>
<depositor_name>Information Society Development Instiute, Republic of Moldova</depositor_name>
<email_address>idsi@asm.md</email_address>
</depositor>
</head>
<body>
<collection>
<collection_metadata>
<full_title>Conference on Mathematical Foundations of Informatics</full_title>
</collection_metadata>
<collection_issue>
<publication_date media_type='print'>
<year>2016</year>
</publication_date>
<isbn>978‐9975‐4237‐4‐8</isbn>
</collection_issue>
<collection_article publication_type='full_text'><titles>
<title>Deniable-encryption protocol using commutative Transformation</title>
</titles>
<contributors>
<person_name sequence='first' contributor_role='author'>
<given_name>Nikolay</given_name>
<surname>Moldovyan</surname>
</person_name>
<person_name sequence='additional' contributor_role='author'>
<given_name>Alexandr</given_name>
<surname>Moldovyan</surname>
</person_name>
<person_name sequence='additional' contributor_role='author'>
<given_name>Alexei</given_name>
<surname>Şcerbacov</surname>
</person_name>
</contributors>
<publication_date media_type='print'>
<year>2016</year>
</publication_date>
<pages>
<first_page>285</first_page>
<last_page>298</last_page>
</pages>
</collection_article>
</collection>
</body>
</doi_batch>