A. Moldovyan, N. Moldovyan, A. N. Berezin, P. I. Shapovalov
{"title":"随机伪概率加密算法","authors":"A. Moldovyan, N. Moldovyan, A. N. Berezin, P. I. Shapovalov","doi":"10.1109/SCM.2017.7970481","DOIUrl":null,"url":null,"abstract":"The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message. It is used the method of randomizing the encryption process and the same decryption algorithm is specified to disclose both the secret and the fake messages. There are introduced randomized pseudo-probabilistic block algorithms for deniable encryption which are implemented as probabilistic simultaneous encryption of the fake and secret message. The proposed algorithms include encryption of the secret message block and the fake message block followed by a randomized mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The mapping procedure represents solving the system of three linear congruencies.","PeriodicalId":315574,"journal":{"name":"2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Randomized pseudo-probabilistic encryption algorithms\",\"authors\":\"A. Moldovyan, N. Moldovyan, A. N. Berezin, P. I. Shapovalov\",\"doi\":\"10.1109/SCM.2017.7970481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message. It is used the method of randomizing the encryption process and the same decryption algorithm is specified to disclose both the secret and the fake messages. There are introduced randomized pseudo-probabilistic block algorithms for deniable encryption which are implemented as probabilistic simultaneous encryption of the fake and secret message. The proposed algorithms include encryption of the secret message block and the fake message block followed by a randomized mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The mapping procedure represents solving the system of three linear congruencies.\",\"PeriodicalId\":315574,\"journal\":{\"name\":\"2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCM.2017.7970481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 XX IEEE International Conference on Soft Computing and Measurements (SCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCM.2017.7970481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message. It is used the method of randomizing the encryption process and the same decryption algorithm is specified to disclose both the secret and the fake messages. There are introduced randomized pseudo-probabilistic block algorithms for deniable encryption which are implemented as probabilistic simultaneous encryption of the fake and secret message. The proposed algorithms include encryption of the secret message block and the fake message block followed by a randomized mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The mapping procedure represents solving the system of three linear congruencies.