메뉴 건너뛰기




Volumn 7232 LNCS, Issue , 2012, Pages 46-62

Deniable encryptions secure against adaptive chosen ciphertext attack

Author keywords

Chosen Ciphertext Attack; Chosen Plaintext Attack; Deniable Encryption

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CHOSEN-PLAINTEXT ATTACK; ENCRYPTION SCHEMES; INDISTINGUISHABILITY; NON-INTERACTIVE; PLAINTEXT; RANDOM NUMBERS; SECURITY NOTION; STORAGE SYSTEMS;

EID: 84859476098     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29101-2_4     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-46. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 26-46
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 80051975494 scopus 로고    scopus 로고
    • Receiver-deniable publickey encryption is impossible
    • ePrint Archive, Report 2011/046
    • Bendlin, R., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: Receiver-deniable publickey encryption is impossible. Cryptology ePrint Archive, Report 2011/046 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Bendlin, R.1    Nielsen, J.B.2    Nordholt, P.S.3    Orlandi, C.4
  • 3
    • 84958626761 scopus 로고    scopus 로고
    • Deniable Encryption
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 4
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 5
    • 79958017065 scopus 로고    scopus 로고
    • Deniable Encryption with Negligible Detection Probability: An Interactive Construction
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Dürmuth, M., Freeman, D.M.: Deniable Encryption with Negligible Detection Probability: An Interactive Construction. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 610-626. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 610-626
    • Dürmuth, M.1    Freeman, D.M.2
  • 6
    • 80051963591 scopus 로고    scopus 로고
    • Deniable encryption with negligible detection probability: An interactive construction
    • ePrint Archive, Report 2011/066
    • Dürmuth, M., Freeman, D.M.: Deniable encryption with negligible detection probability: An interactive construction. Cryptology ePrint Archive, Report 2011/066 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Dürmuth, M.1    Freeman, D.M.2
  • 7
    • 77954642903 scopus 로고    scopus 로고
    • Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 381-402
    • Fehr, S.1    Hofheinz, D.2    Kiltz, E.3    Wee, H.4
  • 8
    • 78650197977 scopus 로고    scopus 로고
    • Deniable cloud storage: Sharing files via public-key deniability
    • Al-Shaer, E., Frikken, K.B. (eds.) ACM
    • Gasti, P., Ateniese, G., Blanton, M.: Deniable cloud storage: sharing files via public-key deniability. In: Al-Shaer, E., Frikken, K.B. (eds.) WPES, pp. 31-42. ACM (2010)
    • (2010) WPES , pp. 31-42
    • Gasti, P.1    Ateniese, G.2    Blanton, M.3
  • 9
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Goldwasser, S., Micali, S.: Probabilistic encryption. JCSS 28(2), 270-299 (1984)
    • (1984) JCSS , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 10
    • 69749086390 scopus 로고    scopus 로고
    • A method for obtaining deniable public-key encryption
    • Ibrahim, M.H.: A method for obtaining deniable public-key encryption. I. J. Network Security 8(1), 1-9 (2009)
    • (2009) I. J. Network Security , vol.8 , Issue.1 , pp. 1-9
    • Ibrahim, M.H.1
  • 11
    • 69749087308 scopus 로고    scopus 로고
    • Receiver-deniable public-key encryption
    • Ibrahim, M.H.: Receiver-deniable public-key encryption. I. J. Network Security 8(2), 159-165 (2009)
    • (2009) I. J. Network Security , vol.8 , Issue.2 , pp. 159-165
    • Ibrahim, M.H.1
  • 12
    • 38549145955 scopus 로고    scopus 로고
    • Practical Deniable Encryption
    • Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. Springer, Heidelberg
    • Klonowski, M., Kubiak, P., Kutyłowski, M.: Practical Deniable Encryption. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 599-609. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4910 , pp. 599-609
    • Klonowski, M.1    Kubiak, P.2    Kutyłowski, M.3
  • 14
    • 80051976689 scopus 로고    scopus 로고
    • Bi-Deniable Public-Key Encryption
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • O'Neill, A., Peikert, C., Waters, B.: Bi-Deniable Public-Key Encryption. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 525-542. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 525-542
    • O'Neill, A.1    Peikert, C.2    Waters, B.3
  • 15
    • 84974554584 scopus 로고
    • Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.