Skip to search formSkip to main contentSkip to account menu

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
While solutions for file system encryption can pre- vent an adversary from determining the contents of files, in situations where… 
Highly Cited
2014
Highly Cited
2014
We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic… 
Highly Cited
2011
Highly Cited
2011
In 1997, Canetti et al. (CRYPTO 1997) put forward the intruiging notion of deniable encryption, which (informally) allows a… 
2010
2010
Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary… 
Highly Cited
2009
Highly Cited
2009
  • M. Ibrahim
  • International Journal of Network Security
  • 2009
  • Corpus ID: 16890126
Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a… 
2009
2009
  • M. Ibrahim
  • International Journal of Network Security
  • 2009
  • Corpus ID: 800013
Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion… 
Highly Cited
2009
Highly Cited
2009
Regulation must target the financial sector, which often funds and profits from environmentally unsustainable development. In an… 
Highly Cited
2008
Highly Cited
2008
A party using encrypted communication or storing data in an encrypted form might be forced to show the corresponding plaintext… 
Highly Cited
2002
Highly Cited
2002
  • M. Naor
  • Annual International Cryptology Conference
  • 2002
  • Corpus ID: 10170993
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some… 
Highly Cited
1997
Highly Cited
1997
6 Coercing the Sender vs. Coercing the Receiver We describe simple constructions that transform sender-deniable schemes into…