Efficient public-key authenticated deniable encryption schemes

被引:8
|
作者
Cao, Yanmei [1 ]
Wei, Jianghong [2 ]
Zhang, Fangguo [3 ]
Xiang, Yang [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Deniable encryption; Full deniability; Authentication; Coercion; CLOUD STORAGE;
D O I
10.1016/j.csi.2022.103620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of deniable encryption (DE) was introduced to achieve secret communications in situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into multiple different messages. After the initial constructions, numerous DE schemes have been proposed to improve efficiency. Whereas, all existing DE schemes under the fully deniable framework are still inefficient due to the huge communication and computation overhead. Furthermore, these DE schemes also do not provide the functionality of authentication of users (include senders and receivers), which is a necessary functionality for various application scenarios. For instance, in the setting of electronic voting, if the voting center cannot correctly verify the identities and eligibility of voters, double voting and voter impersonation cannot be prevented. This will affect the final result of the voting and destroy the fairness of the election. Moreover, due to the existence of trust problems, voters also need to confirm whether the voting center is a genuine and legal institution. In this paper, we first formalize the syntax and security notions of public-key authenticated deniable encryption, and then propose two concrete constructions under the fully deniable framework. We also prove that our DE constructions are provably secure in the random oracle model. When comparing with available DE schemes, the proposed DE ones not only provide the desired functionality of mutual authentication, but also enjoy high efficiency. Therefore, they are more suitable for practical applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] AN EFFICIENT TRUST MODEL FOR PUBLIC-KEY AUTHENTICATION AND DETECTING MALICIOUS NODES IN MANET
    Adivel, Kanimozhi
    Meganathan, Navamani Thandava
    IIOAB JOURNAL, 2016, 7 : 255 - 261
  • [32] Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA)
    Schermann, Raphael
    Urian, Rainer
    Toegl, Ronald
    Bock, Holger
    Steger, Christian
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 646 - 655
  • [33] Action-triggered public-key system for GSM using RSA with phone-dependent encryption
    El Nemr, Rehab K.
    Ismail, Imane Aly Saroit
    Ahmed, S. H.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 175 - +
  • [34] Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search
    Bauspiess, Pia
    Kolberg, Jascha
    Drozdowski, Pawel
    Rathgeb, Christian
    Busch, Christoph
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6972 - 6981
  • [35] 3 An Authenticated Key Transport Protocol Using Symmetric Encryption
    Joshi, Manisha Y.
    Bichkar, R. S.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 348 - 350
  • [36] Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
    Zhang, Yuan
    Xu, Chunxiang
    Ni, Jianbing
    Li, Hongwei
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1335 - 1348
  • [37] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [38] Authenticated secure group communication using broadcast encryption key computation
    Aparna, R.
    Amberker, B. B.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 348 - +
  • [39] Verifiable and authenticated searchable encryption scheme with aggregate key in cloud storage
    Liu, Zhenhua
    Liu, Yaohui
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 421 - 425
  • [40] On Practical Deployment of Smart Card Based Authenticated Key Agreement Schemes
    Malina, Lukas
    Konecny, Jakub
    Dzurenda, Petr
    Hajny, Jan
    2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 277 - 282