Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,943,790 papers from all fields of science
Search
Sign In
Create Free Account
Deniable encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Alice and Bob
BestCrypt
Block cipher
Chaffing and winnowing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
DEFY: A Deniable, Encrypted File System for Log-Structured Storage
Timothy Peters
,
Mark A. Gondree
,
Zachary N. J. Peterson
Network and Distributed System Security Symposium
2015
Corpus ID: 15574767
While solutions for file system encryption can pre- vent an adversary from determining the contents of files, in situations where…
Expand
Highly Cited
2014
Highly Cited
2014
How to use indistinguishability obfuscation: deniable encryption, and more
A. Sahai
,
Brent Waters
IACR Cryptology ePrint Archive
2014
Corpus ID: 12018322
We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic…
Expand
Highly Cited
2011
Highly Cited
2011
Bi-Deniable Public-Key Encryption
Adam O'Neill
,
Chris Peikert
,
Brent Waters
Annual International Cryptology Conference
2011
Corpus ID: 1863968
In 1997, Canetti et al. (CRYPTO 1997) put forward the intruiging notion of deniable encryption, which (informally) allows a…
Expand
2010
2010
An Efficient Receiver Deniable Encryption Scheme and Its Applications
Bo Meng
,
JiangQing Wang
J. Networks
2010
Corpus ID: 8659639
Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary…
Expand
Highly Cited
2009
Highly Cited
2009
A Method for Obtaining Deniable Public-Key Encryption
M. Ibrahim
International Journal of Network Security
2009
Corpus ID: 16890126
Deniable encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion attempted by a…
Expand
2009
2009
Receiver-deniable Public-Key Encryption
M. Ibrahim
International Journal of Network Security
2009
Corpus ID: 800013
Incoercible (or deniable) encryption is an important notion that allows a user (a sender and/or a receiver) to escape a coercion…
Expand
Highly Cited
2009
Highly Cited
2009
Keeping Ethical Investment Ethical: Regulatory Issues for Investing for Sustainability
B. Richardson
2009
Corpus ID: 153964745
Regulation must target the financial sector, which often funds and profits from environmentally unsustainable development. In an…
Expand
Highly Cited
2008
Highly Cited
2008
Practical Deniable Encryption
M. Klonowski
,
Przemyslaw Kubiak
,
Mirosław Kutyłowski
Conference on Current Trends in Theory and…
2008
Corpus ID: 33155262
A party using encrypted communication or storing data in an encrypted form might be forced to show the corresponding plaintext…
Expand
Highly Cited
2002
Highly Cited
2002
Deniable Ring Authentication
M. Naor
Annual International Cryptology Conference
2002
Corpus ID: 10170993
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some…
Expand
Highly Cited
1997
Highly Cited
1997
Deniable Encryption
R. Canetti
,
C. Dwork
,
M. Naor
,
R. Ostrovsky
IACR Cryptology ePrint Archive
1997
Corpus ID: 5143104
6 Coercing the Sender vs. Coercing the Receiver We describe simple constructions that transform sender-deniable schemes into…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE