期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Improvement of an ID-Based Deniable Authentication Protocol
1
作者 Tzu-Chun Lin 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第2期139-144,共6页
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful ... The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. 展开更多
关键词 Bilinear pairing deniable authentication DIFFIE-HELLMAN elliptic curves
下载PDF
Ambiguous Multi-Symmetric Scheme and Applications
2
作者 Richard Bassous Ahmad Mansour +3 位作者 Roger Bassous Huirong Fu Ye Zhu George Corser 《Journal of Information Security》 2017年第4期383-401,共19页
This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC), which conceals multiple coherent plain-texts in one cipher-text. The cipher-text can be decr... This paper introduces and evaluates the performance of a novel cipher scheme, Ambiguous Multi-Symmetric Cryptography (AMSC), which conceals multiple coherent plain-texts in one cipher-text. The cipher-text can be decrypted by different keys to produce different plain-texts. Security analysis showed that AMSC is secure against cipher-text only and known plain-text attacks. AMSC has the following applications: 1) it can send multiple messages for multiple receivers through one cipher-text;2) it can send one real message and multiple decoys for camouflage;and 3) it can send one real message to one receiver using parallel processing. Performance comparison with leading symmetric algorithms (DES, AES and RC6) demonstrated AMSC’s efficiency in execution time. 展开更多
关键词 Deniable ENCRYPTION MULTI ENCRYPTION HONEY ENCRYPTION STEGANOGRAPHY SYMMETRIC ENCRYPTION MULTI Encoding
下载PDF
A new approach for UC security concurrent deniable authentication 被引量:6
3
作者 FENG Tao LI FengHua +1 位作者 MA JianFeng SangJae MOON 《Science in China(Series F)》 2008年第4期352-367,共16页
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch... Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions. 展开更多
关键词 information security concurrent deniable authentication universally composable verifiably smooth projective hashing the decisional composite residuosity assumption
原文传递
Ensuring data confidentiality via plausibly deniable encryption and secure deletion-a survey 被引量:1
4
作者 Qionglu Zhang Shijie Jia +1 位作者 Bing Chang Bo Chen 《Cybersecurity》 2018年第1期106-125,共20页
Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HI... Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act.To provide confidentiality guarantee,the data should be protected when they are preserved in the personal computing devices(i.e.,confidentiality during their lifetime);and also,they should be rendered irrecoverable after they are removed from the devices(i.e.,confidentiality after their lifetime).Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime,respectively.This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices,including both encryption and secure deletion.Especially for encryption,we mainly focus on the novel plausibly deniable encryption(PDE),which can ensure data confidentiality against both a coercive(i.e.,the attacker can coerce the data owner for the decryption key)and a non-coercive attacker. 展开更多
关键词 Data confidentiality Plausibly deniable encryption Secure deletion
原文传递
A Deniable Authenticated Key Agreement Protocol
5
作者 TIAN Haibo1,2, CHEN Xiaofeng1,2, ZHANG Fangguo1,2, WEI Baodian1,2 1. School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510006, Guangdong, China 2. Guangdong Key Laboratory of Information Security Technology, Sun Yat-Sen University, Guangzhou 510275, Guangdong, China 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期645-650,共6页
This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protoc... This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protocol is executed successfully. Then both can deny their transmitted messages protected by the authenticated session key. If this protocol fails, no authenticated session key can be established and no protected messages can be transmitted. The protocol can be proved secure against key compromise impersonation attack. The protocol employs a new method to isolate a session key from confirmation keys. 展开更多
关键词 deniable authentication key agreement key compromise impersonation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部