To obtain access to full text of journal and articles you must register!
- Article name
- Hybrid deniable-encryption protocol based on entity authentication procedure
- Authors
- Moldovyan N. A., , nmold@mail.ru, St. Petersburg Federal Research Center of the RAS (SPC RAS), St. Petersburg, Russia
Mikhteev M. S., , mikhteev@mail.ru, St.-Petersburg State Electrotechnical University "LETI", St.-Petersburg, Russia
- Keywords
- information protection / cryptography / encryption / deniable encryption / probabilistic encryption / public key
- Year
- 2017 Issue 1 Pages 12 - 17
- Code EDN
- Code DOI
- Abstract
- To provide security to active coercive attacks there is included the entity authentication procedure in the hybrid deniable-encryption protocol. The entity authentication is used to provide security against attacks of active coercer and for hiding mutual exchange with the single-use public keys. The lasts are used for computing the single-use shared key Q with which the secret message is encrypted. The long-term public keys are used to perform authentication stage of the protocol and to compute the shared key Z with which a fake message is encrypted. Enciphering the secret and fake messages is implemented simultaneously as some single process of solving a system of two linear equations. The produced final ciphertext is computationally indistinguishable from a ciphertext potentially produced with probabilistic encryption of the fake message with the shared key Z. Such approach provides be-deniability, since disclosing the private keys of the sender and receiver does not reduces secrecy of the used shared single-use key.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy