LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

Hybrid deniable and short-key encryption protocols based on the authentication procedure

Ho, T.S. and Andreevich, M.A. and Andreevich, M.N. and Hoang, C.N. and Nguyen, M.H. and Van Luu, L. and Van Nguyen, T. and Tran, M.C. (2020) Hybrid deniable and short-key encryption protocols based on the authentication procedure. In: 14th International Conference on Advanced Computing and Applications, ACOMP 2020, 25 November 2020 through 27 November 2020.

Text (PDF)
ACOMP2020_paper_42.pdf - Other

Download (230kB) | Preview

Abstract

To ensure resistance to attacks with coercion to disclose a secret key by an active adversary, the protocol of deniable encryption includes a procedure for mutual authentication of the sender and receiver of a message with their long-Term public keys, which is combined with a hidden exchange of single-use public keys used to generate a single-use shared key, on which the secret message is encrypted. Longterm public keys are used to generate a shared secret key, on which a fake message is encrypted. The produced intermediate ciphertexts are converted into a single ciphertext, which is computationally indistinguishable from the ciphertext obtained by probabilistic encryption of a fake message. This approach allows us to build an encryption protocol that is resistant to bi-sided attacks with coercion, since the disclosure of users' private keys gives access only to the fake message and cannot be used to prove the possibility of alternative decryption of the ciphertext transmitted over a public communication channel. The authentication of the single-use public keys is also used to implement protocols for secure encryption using short shared keys. © 2020 IEEE.

Item Type: Conference or Workshop Item (Paper)
Divisions:
Institutes > Institute of System Integration
Identification Number: 10.1109/ACOMP50827.2020.00008
Uncontrolled Keywords: Authentication; Active adversary; Deniable encryptions; Encryption protocols; Mutual authentication; Probabilistic encryption; Secret messages; Sender and receivers; Shared secrets; Cryptography
Additional Information: Conference code: 167321. Language of original document: English.
URI: http://eprints.lqdtu.edu.vn/id/eprint/8872

Actions (login required)

View Item
View Item