Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic… Expand
2013
2013
Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Highly Cited
2011
Highly Cited
2011
In 1997, Canetti et al. (CRYPTO 1997) put forward the intruiging notion of deniable encryption, which (informally) allows a… Expand
2011
2011
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a… Expand
Highly Cited
2009
Highly Cited
2009
  • M. Ibrahim
  • Int. J. Netw. Secur.
  • 2009
  • Corpus ID: 16890126
Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a… Expand
2009
2009
  • M. Ibrahim
  • Int. J. Netw. Secur.
  • 2009
  • Corpus ID: 800013
Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion… Expand
Highly Cited
2009
Highly Cited
2009
Regulation must target the financial sector, which often funds and profits from environmentally unsustainable development. In an… Expand
2008
2008
A party using encrypted communication or storing data in an encrypted form might be forced to show the corresponding plaintext… Expand
2005
2005
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… Expand
Highly Cited
1996
Highly Cited
1996
6 Coercing the Sender vs. Coercing the Receiver We describe simple constructions that transform sender-deniable schemes into… Expand