Advertisement

Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack

  • Chong-zhi Gao
  • Dongqing Xie
  • Baodian Wei
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7232)

Abstract

The deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or the receiver is coerced to show the plaintext and the used random numbers in encryption, a deniable encryption scheme behaves like only an innocent message is encrypted. Because it protects privacy against malicious coercer, the deniable encryption is very useful in communication systems such as the cloud storage system when the communication channel is eavesdropped by a coercer. Previous deniable encryptions only concern the security under the adversary’s chosen plaintext attack (CPA). For non-interactive deniable encryptions, this paper introduce some security notions under adaptive chosen ciphertext attack (CCA). Furthermore, the first sender-deniable construction with deniability and indistinguishability against CCA attack is constructed.

Keywords

Deniable Encryption Chosen Plaintext Attack Chosen Ciphertext Attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–46. Springer, Heidelberg (1998)Google Scholar
  2. 2.
    Bendlin, R., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: Receiver-deniable public-key encryption is impossible. Cryptology ePrint Archive, Report 2011/046 (2011), http://eprint.iacr.org/
  3. 3.
    Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997)Google Scholar
  4. 4.
    Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45–64. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Dürmuth, M., Freeman, D.M.: Deniable Encryption with Negligible Detection Probability: An Interactive Construction. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 610–626. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Dürmuth, M., Freeman, D.M.: Deniable encryption with negligible detection probability: An interactive construction. Cryptology ePrint Archive, Report 2011/066 (2011), http://eprint.iacr.org/
  7. 7.
    Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381–402. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Gasti, P., Ateniese, G., Blanton, M.: Deniable cloud storage: sharing files via public-key deniability. In: Al-Shaer, E., Frikken, K.B. (eds.) WPES, pp. 31–42. ACM (2010)Google Scholar
  9. 9.
    Goldwasser, S., Micali, S.: Probabilistic encryption. JCSS 28(2), 270–299 (1984)MathSciNetzbMATHGoogle Scholar
  10. 10.
    Ibrahim, M.H.: A method for obtaining deniable public-key encryption. I. J. Network Security 8(1), 1–9 (2009)Google Scholar
  11. 11.
    Ibrahim, M.H.: Receiver-deniable public-key encryption. I. J. Network Security 8(2), 159–165 (2009)Google Scholar
  12. 12.
    Klonowski, M., Kubiak, P., Kutyłowski, M.: Practical Deniable Encryption. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 599–609. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  13. 13.
    Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attack. In: Proc. of the Twenty-Second Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, pp. 427–437. ACM (1990)Google Scholar
  14. 14.
    O’Neill, A., Peikert, C., Waters, B.: Bi-Deniable Public-Key Encryption. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 525–542. Springer, Heidelberg (2011)Google Scholar
  15. 15.
    Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Chong-zhi Gao
    • 1
    • 2
  • Dongqing Xie
    • 1
  • Baodian Wei
    • 3
  1. 1.School of Computer ScienceGuangzhou UniversityGuangzhouChina
  2. 2.Key Laboratory of Network Security and CryptologyFujian Normal UniversityFuzhouChina
  3. 3.Department of Electronics and Communication EngineeringSun Yat-sen UniversityGuangzhouChina

Personalised recommendations