N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan
{"title":"基于标准PKI的双否认公开加密协议","authors":"N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan","doi":"10.1109/FRUCT-ISPIT.2016.7561530","DOIUrl":null,"url":null,"abstract":"The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.","PeriodicalId":309242,"journal":{"name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Bi-deniable public-encryption protocols based on standard PKI\",\"authors\":\"N. Moldovyan, A. N. Berezin, A. Kornienko, A. Moldovyan\",\"doi\":\"10.1109/FRUCT-ISPIT.2016.7561530\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.\",\"PeriodicalId\":309242,\"journal\":{\"name\":\"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561530\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bi-deniable public-encryption protocols based on standard PKI
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and the active one. It is supposed the coercive adversary intercepts all data sent during the protocol. The protocols use no shared secret keys that are pre-agreed by parties of the protocol. Bi-deniability is based on computational indistinguishability between deniable encryption and probabilistic one. Significant merit of the proposed protocols is their using the standard public key infrastructure.