Efficient public-key authenticated deniable encryption schemes

被引:8
|
作者
Cao, Yanmei [1 ]
Wei, Jianghong [2 ]
Zhang, Fangguo [3 ]
Xiang, Yang [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Deniable encryption; Full deniability; Authentication; Coercion; CLOUD STORAGE;
D O I
10.1016/j.csi.2022.103620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of deniable encryption (DE) was introduced to achieve secret communications in situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into multiple different messages. After the initial constructions, numerous DE schemes have been proposed to improve efficiency. Whereas, all existing DE schemes under the fully deniable framework are still inefficient due to the huge communication and computation overhead. Furthermore, these DE schemes also do not provide the functionality of authentication of users (include senders and receivers), which is a necessary functionality for various application scenarios. For instance, in the setting of electronic voting, if the voting center cannot correctly verify the identities and eligibility of voters, double voting and voter impersonation cannot be prevented. This will affect the final result of the voting and destroy the fairness of the election. Moreover, due to the existence of trust problems, voters also need to confirm whether the voting center is a genuine and legal institution. In this paper, we first formalize the syntax and security notions of public-key authenticated deniable encryption, and then propose two concrete constructions under the fully deniable framework. We also prove that our DE constructions are provably secure in the random oracle model. When comparing with available DE schemes, the proposed DE ones not only provide the desired functionality of mutual authentication, but also enjoy high efficiency. Therefore, they are more suitable for practical applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Public Key Authenticated Encryption With Designated Equality Test and Its Applications in Diagnostic Related Groups
    Wang, Yuanhao
    Huang, Qiong
    Li, Hongbo
    Huang, Jianye
    Yang, Guomin
    Susilo, Willy
    IEEE ACCESS, 2019, 7 : 135999 - 136011
  • [22] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [23] Chameleon-based deniable authenticated key agreement protocol secure against forgery
    Ma, Chunbo
    Ao, Jun
    Li, Jianhua
    ONLINE COMMUNITIES AND SOCIAL COMPUTING, PROCEEDINGS, 2007, 4564 : 124 - +
  • [24] PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query
    Chen, Liqing
    Li, Jiayi
    Li, Jiguo
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9910 - 9923
  • [25] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [26] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    Wireless Personal Communications, 2018, 100 : 907 - 921
  • [27] Improvement of authenticated encryption schemes with message linkages for message flows
    Hwang, MS
    Lo, JW
    Hsiao, SY
    Chu, YP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (04) : 1575 - 1577
  • [28] Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols based on Two Hard Problems
    Do Viet Binh
    Nguyen Hieu Minh
    Nguyen Nam Hai
    Hur, Junbeom
    Dang Hoang Minh
    Ho Sy Tan
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2017, : 16 - 22
  • [29] An efficient public-key based authentication with Mobile-IF in E-commerce
    Chung, S
    Chae, K
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2825 - 2831
  • [30] SEPS: Efficient public-key based secure search over outsourced data
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61