Efficient public-key authenticated deniable encryption schemes

被引:8
|
作者
Cao, Yanmei [1 ]
Wei, Jianghong [2 ]
Zhang, Fangguo [3 ]
Xiang, Yang [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] PLA Strateg Support Force Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
[4] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
关键词
Deniable encryption; Full deniability; Authentication; Coercion; CLOUD STORAGE;
D O I
10.1016/j.csi.2022.103620
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of deniable encryption (DE) was introduced to achieve secret communications in situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into multiple different messages. After the initial constructions, numerous DE schemes have been proposed to improve efficiency. Whereas, all existing DE schemes under the fully deniable framework are still inefficient due to the huge communication and computation overhead. Furthermore, these DE schemes also do not provide the functionality of authentication of users (include senders and receivers), which is a necessary functionality for various application scenarios. For instance, in the setting of electronic voting, if the voting center cannot correctly verify the identities and eligibility of voters, double voting and voter impersonation cannot be prevented. This will affect the final result of the voting and destroy the fairness of the election. Moreover, due to the existence of trust problems, voters also need to confirm whether the voting center is a genuine and legal institution. In this paper, we first formalize the syntax and security notions of public-key authenticated deniable encryption, and then propose two concrete constructions under the fully deniable framework. We also prove that our DE constructions are provably secure in the random oracle model. When comparing with available DE schemes, the proposed DE ones not only provide the desired functionality of mutual authentication, but also enjoy high efficiency. Therefore, they are more suitable for practical applications.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [42] An efficient authenticated encryption scheme with message linkages and low communication costs
    Tseng, YM
    Jan, JK
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (01) : 41 - 46
  • [43] Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices
    Chien, Hung-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2177 - 2188
  • [44] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [45] Public-key based security scheme for wireless sensor network
    Chen, Jiann-Liang
    Lai, Yin-Fu
    Lu, Hsi-Feng
    Kuo, Quan-Cheng
    2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258
  • [46] Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching
    Wang, Minmei
    Qian, Chen
    Li, Xin
    Shi, Shouqian
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 847 - 855
  • [47] Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching
    Wang, Minmei
    Qian, Chen
    Li, Xin
    Shi, Shouqian
    Chen, Shigang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (01) : 92 - 105
  • [48] Two ID-based authenticated schemes with key agreement for mobile environments
    Chih-Ho Chou
    Kuo-Yu Tsai
    Chung-Fu Lu
    The Journal of Supercomputing, 2013, 66 : 973 - 988
  • [49] A Public Key Encryption Scheme for String Identification
    Ray, Indranil Ghosh
    Rajarajan, Muttukrishnan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 104 - 111
  • [50] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135