|
Volumn 8, Issue 1, 2009, Pages 1-9
|
A method for obtaining deniable public-key encryption
|
Author keywords
Blum primes; Coercive adversary; Deniable encryption; Factoring attacks; Public key; Quadratic residuosity; Trapdoor permutation
|
Indexed keywords
BLUM PRIMES;
COERCIVE ADVERSARY;
DENIABLE ENCRYPTIONS;
FACTORING ATTACKS;
PUBLIC KEYS;
QUADRATIC RESIDUOSITY;
TRAPDOOR PERMUTATIONS;
SECURITY OF DATA;
PUBLIC KEY CRYPTOGRAPHY;
|
EID: 69749086390
PISSN: 1816353X
EISSN: 18163548
Source Type: Journal
DOI: None Document Type: Article |
Times cited : (45)
|
References (11)
|