To obtain access to full text of journal and articles you must register!
- Article name
- No-key protocol for deniable encryption
- Authors
- Moldovyan N. A., , nmold@mail.ru, St. Petersburg Federal Research Center of the RAS (SPC RAS), St. Petersburg, Russia
Shcherbacov A. V., , scerb@math.md, St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, St.-Petersburg, Russia
- Keywords
- information protection / cryptography / encryption / deniable encryption / probabilistic encryption / commutative encryption
- Year
- 2016 Issue 2 Pages 9 - 14
- Code EDN
- Code DOI
- Abstract
- There are proposed a new method for deniable encryption based on commutative transformations. On the base of the method it has been designed the protocol resistant to the passive coercive attacks, which uses no shared secret keys and no pre-exchanged public keys. To provide security against active coercer the protocol is to be complemented with procedure for authenticating the sent messages.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy