Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,585,419 papers from all fields of science
Search
Sign In
Create Free Account
Deniable encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
BestCrypt
Block cipher
Chaffing and winnowing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Post-quantum Commutative Deniable Encryption Algorithm
N. H. Minh
,
D. Moldovyan
,
+5 authors
Cong Manh Tran
2020
Corpus ID: 216514165
There is proposed a new post-quantum commutative encryption algorithm based on the hidden discrete logarithm problem. The…
Expand
2016
2016
Stream Deniable-Encryption Algorithms
N. Moldovyan
,
A. Moldovyan
,
D. Moldovyan
,
V. Shcherbacov
Comput. Sci. J. Moldova
2016
Corpus ID: 1668002
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the…
Expand
2016
2016
Bi-deniable public-encryption protocols based on standard PKI
N. Moldovyan
,
A. N. Berezin
,
A. Kornienko
,
A. Moldovyan
18th Conference of Open Innovations Association…
2016
Corpus ID: 18206206
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both the passive coercive attack and…
Expand
2015
2015
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
A. N. Berezin
,
A. Moldovyan
,
N. A. Moldovyan
System Configuration Management
2015
Corpus ID: 19055535
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is…
Expand
2015
2015
Provably sender-deniable encryption scheme
N. Moldovyan
,
A. Moldovyan
,
Victor Scerbacov
Comput. Sci. J. Moldova
2015
Corpus ID: 22610668
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption…
Expand
2012
2012
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
IACR Cryptology ePrint Archive
2012
Corpus ID: 18956319
The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, 1997). Deniable encryption is a regular…
Expand
2012
2012
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack
Chong-zhi Gao
,
Dongqing Xie
,
Jin Li
,
Baodian Wei
,
Haibo Tian
Fourth International Conference on Intelligent…
2012
Corpus ID: 15264588
The deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information in…
Expand
2012
2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
Chong-zhi Gao
,
Dongqing Xie
,
Baodian Wei
Information Security Practice and Experience
2012
Corpus ID: 42952237
The deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or…
Expand
2012
2012
Desirable features for plausibly deniable encryption
Björgvin Ragnarsson
,
G. Toth
,
Hanieh Bagheri
,
W. Minnaard
2012
Corpus ID: 53971051
In this paper we describe essential components of deniable cryptography. We discuss the concept of plausibility and determine the…
Expand
Review
2008
Review
2008
Design and Analysis of a Practical E-Voting Protocol
Marián Novotný
FIDIS
2008
Corpus ID: 508014
In this paper we design an e-voting protocol for an academic voting system which should be independent from other university…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE