A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to Hide the Real Receiver under the Cover Receiver: CP-ABE with Policy Deniability
2020
IEEE Access
In this work, we apply the deniability concept to solve this problem. ...
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. ...
They further constructed a white-box traceable CP-ABE scheme with accountability in order to address the user key abuse and authorization center key abuse. ...
doi:10.1109/access.2020.2993688
fatcat:bnre3gs4l5hxnfdqvtbrsztkna
Hecate: Abuse Reporting in Secure Messengers with Sealed Sender
[article]
2021
IACR Cryptology ePrint Archive
Second, on top of AMF's accountability and deniability requirements, we also add forward and backward secrecy. ...
End-to-end encryption provides strong privacy protections to billions of people, but it also complicates efforts to moderate content that can seriously harm people. ...
Collision Resistance. Let π = {Gen, H} denote a hash function. ...
dblp:journals/iacr/IssaAV21
fatcat:bisd6kguure25makrsq7ki3gty
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems
2019
Sensors
In this scenario, attribute-based encryption (ABE) is an appropriate technique for securing data communication between sensors and clouds. ...
Each cloud has its own attributes and a broker can determine which cloud is authorized to access data by the requirements set at the time of encryption. ...
There are three associated requirements, collision resistance, semantic security and collision forgery, are listed below. Definition 4 (Collision Resistance). ...
doi:10.3390/s19245463
pmid:31835804
pmcid:PMC6960710
fatcat:uyhcysnrbjhdpmait25vv5ujmu
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices
[chapter]
2014
Lecture Notes in Computer Science
In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack. ...
For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk. ...
The resistance against the booting-time attack is also featured in MobiHydra. ...
doi:10.1007/978-3-319-13257-0_36
fatcat:msllobydinf2tdeobfuosxbwoe
Simulation of Route Optimization with load balancing Using AntNet System
2013
IOSR Journal of Computer Engineering
The well known and widely used tamper-resistance RSA-Secured tokens [10] ). ...
The well known and widely used tamper-resistance RSA-Secured tokens [10] ). ...
IX CONCLUSION This method would help in encrypting the data individually though all the data belong to the same database. The common encryption format for a database can be totally eradicated. ...
doi:10.9790/0661-1140107
fatcat:cj275itmxndyvomoapvvho5v3e
Multi-party off-the-record messaging
2009
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
For whistleblowers, informants, political dissidents and journalists -to name a few -it is most important to have means for deniable conversation, where electronic communication must mimic face-to-face ...
In the following discussion, we abuse notation in that a single value M may be replaced by a tuple (x1, x2, . . .). ...
For example Alice can pick a symmetric encryption key κ encrypt her message with κ, encrypt κ with Bob's public key and send everything to Bob. ...
doi:10.1145/1653662.1653705
dblp:conf/ccs/GoldbergUGC09
fatcat:s5sr2ax2kbfudcgq7y2u4gnah4
Deniable Key Exchanges for Secure Messaging
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
the deniability properties of the popular TextSecure secure messaging application. ...
Deniable authenticated key exchanges (DAKEs), the cryptographic protocols responsible for providing deniability in secure messaging applications, cannot currently provide all desirable properties simultaneously ...
We abuse notation by assuming that r $ ← − {0, 1} λ produces a random binary value with an appropriate length for the task at hand, with a security level controlled by λ. ...
doi:10.1145/2810103.2813616
dblp:conf/ccs/UngerG15
fatcat:i5crh7s75ffzzcn4mcdfv4ooca
A Cryptographic Analysis of OPACITY
[chapter]
2013
Lecture Notes in Computer Science
Thus, we investigate in how far the common security properties for authenticated key exchange and impersonation resistance, as well as privacy-related properties like untraceability and deniability, are ...
Intuitively outsider deniability protects against the external abuse of transcripts between honest parties. ...
There are different approaches and levels of deniability [9, 23, 24, 22, 28] ; in light of what OPACITY can achieve we focus on a very basic level protecting only against abuse of transcripts between ...
doi:10.1007/978-3-642-40203-6_20
fatcat:rbibehz2evgjncwexcr7mw4wga
Private Yet Abuse Resistant Open Publishing
[chapter]
2010
Lecture Notes in Computer Science
We present the problem of abusive, off-topic or repetitive postings on open publishing websites, and the difficulties associated with filtering them out. ...
DISCUSSION First we need to discuss why this scheme provides resistance to abuse. ...
Both of these assumption can be relaxed leading to more flexible, and re-usable abuse resistant publishing systems. ...
doi:10.1007/978-3-642-17773-6_28
fatcat:gr6cy7cqkvhixjd4rdgizji26i
The Steganographic File System
[chapter]
1998
Lecture Notes in Computer Science
However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope. In this paper, we present the steganographic file system. ...
Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability ...
There are some deniable encryption schemes in the literature (e.g. [5, 6, 11]) but these protocols can still generally protect only short messages, and are not applicable to storage. ...
doi:10.1007/3-540-49380-8_6
fatcat:yh7hl2ukubfmtbst2oxv2bzig4
Message in a bottle
2013
Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13
We have introduced miab, a deniable protocol for censorship resistance that works with minimal requirements. miab can be used as a standalone communication system, or to bootstrap protocols that achieve ...
Bob should be able to provide a fair service to its users by rate limiting blogs, and ban them when they exhibit abusive behavior. ...
doi:10.1145/2523649.2523654
dblp:conf/acsac/InvernizziKV13
fatcat:2o4kcwororgwpmdsudaq6j35hi
Efficient Public-Key Cryptography in the Presence of Key Leakage
[chapter]
2010
Lecture Notes in Computer Science
CCA-secure encryption. ...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, called "memory attacks", where an attacker can repeatedly and adaptively learn information about the ...
The signature-based AKA protocol is not deniable. However, we also construct a deniable AKA protocol based on our construction of leakage-flexible CCA-secure encryption. ...
doi:10.1007/978-3-642-17373-8_35
fatcat:hukm365jfvhmxabgvnja3p6dgy
Certificateless Deniable Authenticated Encryption for Location-based Privacy Protection
2019
IEEE Access
Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data confidentiality with deniable authentication in an efficient manner. ...
INDEX TERMS Deniable authenticated encryption (DAE), certificateless cryptography, random oracle model, location-based services (LBSs). ...
So deniable authentication can ensure the location privacy of users.
A. RELATED WORKS Three related notions are introduced, CLC, hybrid encryption, and deniable authentication. ...
doi:10.1109/access.2019.2931056
fatcat:2qj5l5qinjgejmcrblsaas55xe
Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience
2002
JAMIA Journal of the American Medical Informatics Association
"Public-deniable" includes informa-tion about conditions specifically addressed by state law, such as mental health, HIV/AIDS, abortion, adoption, sexually transmitted diseases, and substance abuse. ...
Both physicians and patients gave PCAS-SO very high ratings on its safety, and the system has continually resisted attack. ...
doi:10.1197/jamia.m1005
pmid:11861633
pmcid:PMC344575
fatcat:qqyzvpnsy5cjvnfjczbojms4py
Improved group off-the-record messaging
2013
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society - WPES '13
GOTR resists network failure, colluding and independent malicious insiders, and provides efficient and flexible membership management. ...
This prevents inside forgers who act individually and do not control message delivery, like average end-users, from abusing Ui's circle key. ...
The repudiability of our scheme does not rely on the deniability of the entity authentication algorithm, and therefore circumvents the problems in real-world plausible deniability. ...
doi:10.1145/2517840.2517867
dblp:conf/wpes/LiuVH13
fatcat:paa6n5g52baahhixnhze6tk3fa
« Previous
Showing results 1 — 15 out of 291 results