Deniable encryption protocols based on probabilistic public-key encryption
The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable protocols are described. To provide bi-deniability in the case of attacks perfored by an active coercer stag...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
FRUCT
2017-04-01
|
Series: | Proceedings of the XXth Conference of Open Innovations Association FRUCT |
Subjects: | |
Online Access: | https://fruct.org/publications/fruct20/files/Mol.pdf |