Efficient public-key authenticated deniable encryption schemes

被引:8
|
作者
Cao, Yanmei [1 ]
Wei, Jianghong [2 ]
Zhang, Fangguo [3 ]
Xiang, Yang [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Deniable encryption; Full deniability; Authentication; Coercion; CLOUD STORAGE;
D O I
10.1016/j.csi.2022.103620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of deniable encryption (DE) was introduced to achieve secret communications in situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into multiple different messages. After the initial constructions, numerous DE schemes have been proposed to improve efficiency. Whereas, all existing DE schemes under the fully deniable framework are still inefficient due to the huge communication and computation overhead. Furthermore, these DE schemes also do not provide the functionality of authentication of users (include senders and receivers), which is a necessary functionality for various application scenarios. For instance, in the setting of electronic voting, if the voting center cannot correctly verify the identities and eligibility of voters, double voting and voter impersonation cannot be prevented. This will affect the final result of the voting and destroy the fairness of the election. Moreover, due to the existence of trust problems, voters also need to confirm whether the voting center is a genuine and legal institution. In this paper, we first formalize the syntax and security notions of public-key authenticated deniable encryption, and then propose two concrete constructions under the fully deniable framework. We also prove that our DE constructions are provably secure in the random oracle model. When comparing with available DE schemes, the proposed DE ones not only provide the desired functionality of mutual authentication, but also enjoy high efficiency. Therefore, they are more suitable for practical applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Deniable Public-Key Authenticated Quantum Key Exchange
    van Wier, Jeroen
    Atashpendar, Arash
    Roenne, Peter
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 97 - 112
  • [2] Bi-Deniable Public-Key Encryption
    O'Neill, Adam
    Peikert, Chris
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 525 - 542
  • [3] A method for obtaining deniable public-key encryption
    Ibrahim, Maged Hamada
    International Journal of Network Security, 2009, 8 (01) : 1 - 9
  • [4] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289
  • [5] Lower and Upper Bounds for Deniable Public-Key Encryption
    Bendlin, Rikke
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Orlandi, Claudio
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 125 - +
  • [6] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [7] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [8] CASE: A New Frontier in Public-Key Authenticated Encryption
    Agrawal, Shashank
    Agrawal, Shweta
    Prabhakaran, Manoj
    Raghunath, Rajeev
    Singla, Jayesh
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 189 - 219
  • [9] Authenticated public-key encryption based on elliptic curve
    Han, YL
    Yang, XY
    Hu, YP
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 424 - 431
  • [10] Public-Key Encryption Schemes with Auxiliary Inputs
    Dodis, Yevgeniy
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Peikert, Chris
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +