N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan
{"title":"Bi-deniable public-encryption protocols based on standard PKI","authors":"N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan","doi":"10.1109/FRUCT-ISPIT.2016.7561530","DOIUrl":null,"url":null,"abstract":"The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.