Method for Pseudo-probabilistic Block Encryption
- 558 Downloads
There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudoprobabilistic block ciphers. The proposed method includes encryption of the secret message block and the fake message block followed by a transformation procedure mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The transformation procedure represents solving the system of two linear congruencies.
KeywordsBlock cipher Plan-ahead Shared-key Pseudo-probabilistic cipher Symmetric Deniable Encryption
- 3.Moldovyan, N.A., Shcherbacov, A.V., Eremeev, M.A.: Deniable-encryption protocols based on commutative ciphers. Quasigroups Relat. Syst. 95–108 (2017)Google Scholar
- 4.Meng, B.: A secure internet voting protocol based on non-interactive deniable authentication protocol and proof protocol that two ciphertexts are encryption of the same plaintext. J. Netw. 4, 370–377 (2009)Google Scholar
- 6.Moldovyan, A.A., Moldovyan, D.N., Shcherbacov, V.A.: Stream deniable-encryption algorithm satisfying criterion of the computational indistinguishability from probabilistic ciphering. In: Workshop on Foundations of Informatics, Chisinau, pp. 318–330 (2015)Google Scholar
- 10.Barakat, T.M.: A new sender-side public-key deniable encryption scheme with fast decryption. KSII Trans. Internet Inf. Syst. (TIIS) 8, 3231–3249 (2014)Google Scholar