Efficient public-key authenticated deniable encryption schemes

被引:8
|
作者
Cao, Yanmei [1 ]
Wei, Jianghong [2 ]
Zhang, Fangguo [3 ]
Xiang, Yang [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Deniable encryption; Full deniability; Authentication; Coercion; CLOUD STORAGE;
D O I
10.1016/j.csi.2022.103620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of deniable encryption (DE) was introduced to achieve secret communications in situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into multiple different messages. After the initial constructions, numerous DE schemes have been proposed to improve efficiency. Whereas, all existing DE schemes under the fully deniable framework are still inefficient due to the huge communication and computation overhead. Furthermore, these DE schemes also do not provide the functionality of authentication of users (include senders and receivers), which is a necessary functionality for various application scenarios. For instance, in the setting of electronic voting, if the voting center cannot correctly verify the identities and eligibility of voters, double voting and voter impersonation cannot be prevented. This will affect the final result of the voting and destroy the fairness of the election. Moreover, due to the existence of trust problems, voters also need to confirm whether the voting center is a genuine and legal institution. In this paper, we first formalize the syntax and security notions of public-key authenticated deniable encryption, and then propose two concrete constructions under the fully deniable framework. We also prove that our DE constructions are provably secure in the random oracle model. When comparing with available DE schemes, the proposed DE ones not only provide the desired functionality of mutual authentication, but also enjoy high efficiency. Therefore, they are more suitable for practical applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [22] Strong Knowledge Extractors for Public-Key Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 164 - +
  • [23] An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things
    Chi, Tianyu
    Qin, Baodong
    Zheng, Dong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [24] Public-Key Encryption with Efficient Amortized Updates
    Chandran, Nishanth
    Ostrovsky, Rafail
    Skeith, William E., III
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 17 - +
  • [25] Dual-Server Public-Key Authenticated Encryption with Keyword Search
    Chen, Biwen
    Wu, Libing
    Zeadally, Sherali
    He, Debiao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 322 - 333
  • [26] Pairing-free public-key authenticated encryption with keyword search
    Bai, Lisha
    Yong, Lei
    Chen, Zhixian
    Shao, Jun
    COMPUTER STANDARDS & INTERFACES, 2024, 88
  • [27] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [28] Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
    Qin, Baodong
    Cui, Hui
    Zheng, Xiaokun
    Zheng, Dong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 19 - 38
  • [29] Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited
    Emura, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 260 - 274
  • [30] EFFICIENT PUBLIC-KEY OPERATION IN MULTIVARIATE SCHEMES
    Cabarcas, Felipe
    Cabarcas, Daniel
    Baena, John
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (02) : 343 - 371