101. Hybrid deniable and short-key encryption protocols based on the authentication procedure
- Author
-
Moldovyan Nikolay Andreevich, Lich Van Luu, Moldovyan Alexander Andreevich, Minh Hieu Nguyen, Tien Van Nguyen, Canh Ngoc Hoang, Manh Cong Tran, and Tan Sy Ho
- Subjects
Authentication ,Computer science ,business.industry ,Computational indistinguishability ,Mutual authentication ,Shared secret ,Cryptographic protocol ,Adversary ,Computer security ,computer.software_genre ,Encryption ,Public-key cryptography ,Deniable encryption ,Probabilistic encryption ,Ciphertext ,business ,computer - Abstract
To ensure resistance to attacks with coercion to disclose a secret key by an active adversary, the protocol of deniable encryption includes a procedure for mutual authentication of the sender and receiver of a message with their long-term public keys, which is combined with a hidden exchange of single-use public keys used to generate a single-use shared key, on which the secret message is encrypted. Longterm public keys are used to generate a shared secret key, on which a fake message is encrypted. The produced intermediate ciphertexts are converted into a single ciphertext, which is computationally indistinguishable from the ciphertext obtained by probabilistic encryption of a fake message. This approach allows us to build an encryption protocol that is resistant to bi-sided attacks with coercion, since the disclosure of users' private keys gives access only to the fake message and cannot be used to prove the possibility of alternative decryption of the ciphertext transmitted over a public communication channel. The authentication of the single-use public keys is also used to implement protocols for secure encryption using short shared keys.
- Published
- 2020
- Full Text
- View/download PDF