题名 |
A Method for Obtaining Deniable Public-Key Encryption |
DOI |
10.6633/IJNS.200901.8(1).01 |
作者 |
Maged Hamada Ibrahim |
关键词 |
Blum primes ; coercive adversary ; deniable encryption ; factoring attacks ; public key ; quadratic residuosity ; trapdoor permutation |
期刊名称 |
International Journal of Network Security |
卷期/出版年月 |
8卷1期(2009 / 01 / 01) |
页次 |
1 - 9 |
内容语文 |
英文 |
英文摘要 |
Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a coercive adversary. Such an adversary approaches the coerced user after transmission forcing him to reveal all his random inputs used during encryption or decryption. Since traditional encryption schemes commits the user to his random inputs, the user is forced to reveal the true values of all his random inputs (including the encrypted/decrypted messages and the encryption/decryption keys) which are verifiable by this coercer using the intercepted ciphertext. In this scenario, a coercer may force the user to perform actions against his wish. In this paper we present a scheme for sender-deniable public-key encryption, by which, the sender is able to lie about the encrypted message to a coercer and hence, escape a coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which when verified gives the same ciphertext as the true message. Our schemes rely on quadratic residuosity of a two-prime modulus. Deniability improvements to these schemes considering the sender’s local randomness are also presented. We also show how to build an efficient deniable public-key encryption from any trapdoor permutation. Compared to the schemes proposed in [5], our schemes require much less bandwidth, provide stronger deniability and no decryption errors. |
主题分类 |
基礎與應用科學 >
資訊科學 |