{"title":"流可否认加密在计算上与概率加密难以区分","authors":"A. N. Berezin, A. Moldovyan, N. A. Moldovyan","doi":"10.1109/SCM.2015.7190395","DOIUrl":null,"url":null,"abstract":"For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key. When the sender and receiver of the message are coerced to open the encryption key, they open the fake key with which the cryptogram is transformed into the fake message. To recover the secret message from the cryptogram the receiver uses the secret key. The algorithm is constructed on the base of some secure hash function with which two key streams are generated. The key streams are mixed with secret data stream and with fake data stream so that cryptograms looks like the ciphertext produced by the probabilistic encryption of the fake message with the fake key.","PeriodicalId":106868,"journal":{"name":"2015 XVIII International Conference on Soft Computing and Measurements (SCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Stream deniable-encryption computationally indistinguishable from probabilistic ciphering\",\"authors\":\"A. N. Berezin, A. Moldovyan, N. A. Moldovyan\",\"doi\":\"10.1109/SCM.2015.7190395\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key. When the sender and receiver of the message are coerced to open the encryption key, they open the fake key with which the cryptogram is transformed into the fake message. To recover the secret message from the cryptogram the receiver uses the secret key. The algorithm is constructed on the base of some secure hash function with which two key streams are generated. The key streams are mixed with secret data stream and with fake data stream so that cryptograms looks like the ciphertext produced by the probabilistic encryption of the fake message with the fake key.\",\"PeriodicalId\":106868,\"journal\":{\"name\":\"2015 XVIII International Conference on Soft Computing and Measurements (SCM)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 XVIII International Conference on Soft Computing and Measurements (SCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCM.2015.7190395\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 XVIII International Conference on Soft Computing and Measurements (SCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCM.2015.7190395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key. When the sender and receiver of the message are coerced to open the encryption key, they open the fake key with which the cryptogram is transformed into the fake message. To recover the secret message from the cryptogram the receiver uses the secret key. The algorithm is constructed on the base of some secure hash function with which two key streams are generated. The key streams are mixed with secret data stream and with fake data stream so that cryptograms looks like the ciphertext produced by the probabilistic encryption of the fake message with the fake key.