Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications

Kasper Bonne Rasmussen, Paolo Gasti
{"title":"Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications","authors":"Kasper Bonne Rasmussen, Paolo Gasti","doi":"10.1109/PST.2018.8514181","DOIUrl":null,"url":null,"abstract":"Consider a scenario in which a whistleblower (Alice) would like to disclose confidential documents to ajournalist (Bob). Bob wants to verify that the messages he receives are really from Alice; at the same time, Alice does not want to be implicated if Bob is later compelled to (or decides to) disclose her messages, together with his secret key and any other relevant secret information. To fulfill these requirements, Alice and Bob can use a deniable authenticated encryption scheme. In this paper we formalize the notions of strong- and weak deniable authentication, and discuss the relationship between these definitions. We show that Bob can still securely authenticate messages from Alice after all his secret information is revealed to the adversary, but only when using a weakly (but not strongly) deniable scheme. We refer to this ability as post-compromise message authentication. We present two efficient encryption schemes that provide deniable authentication. Both schemes incur overhead similar to that of non-deniable schemes. As such, they are suitable not only when deniability is needed, but also as general encryption tools. We provide details of the encryption, decryption, forgery and key- generation algorithms, and formally prove that our schemes are secure with respect to confidentiality, data authentication, and strong- and weak deniable authentication.","PeriodicalId":265506,"journal":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PST.2018.8514181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Consider a scenario in which a whistleblower (Alice) would like to disclose confidential documents to ajournalist (Bob). Bob wants to verify that the messages he receives are really from Alice; at the same time, Alice does not want to be implicated if Bob is later compelled to (or decides to) disclose her messages, together with his secret key and any other relevant secret information. To fulfill these requirements, Alice and Bob can use a deniable authenticated encryption scheme. In this paper we formalize the notions of strong- and weak deniable authentication, and discuss the relationship between these definitions. We show that Bob can still securely authenticate messages from Alice after all his secret information is revealed to the adversary, but only when using a weakly (but not strongly) deniable scheme. We refer to this ability as post-compromise message authentication. We present two efficient encryption schemes that provide deniable authentication. Both schemes incur overhead similar to that of non-deniable schemes. As such, they are suitable not only when deniability is needed, but also as general encryption tools. We provide details of the encryption, decryption, forgery and key- generation algorithms, and formally prove that our schemes are secure with respect to confidentiality, data authentication, and strong- and weak deniable authentication.
弱和强可否认认证加密:它们之间的关系和应用
考虑这样一个场景:举报人(Alice)想要向记者(Bob)披露机密文件。Bob想要验证他收到的消息是否真的来自Alice;与此同时,如果鲍勃后来被迫(或决定)披露她的消息,连同他的秘钥和任何其他相关的秘密信息,爱丽丝不希望受到牵连。为了满足这些需求,Alice和Bob可以使用可否认的身份验证加密方案。本文形式化了强可否认认证和弱可否认认证的概念,并讨论了这些定义之间的关系。我们证明,在向对手透露了Bob的所有秘密信息之后,Bob仍然可以安全地验证来自Alice的消息,但前提是使用弱(但不是强)可否认方案。我们将这种能力称为妥协后消息身份验证。我们提出了两种提供可否认身份验证的有效加密方案。这两种方案都会产生与不可否认方案类似的开销。因此,它们不仅适用于需要可否认性的情况,而且也适用于通用加密工具。我们提供了加密、解密、伪造和密钥生成算法的详细信息,并正式证明了我们的方案在机密性、数据身份验证以及强弱可否认身份验证方面是安全的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信