To obtain access to full text of journal and articles you must register!
- Article name
- Method of the deniable encryption
- Authors
- Moldovyan N. A., , nmold@mail.ru, St. Petersburg Federal Research Center of the RAS (SPC RAS), St. Petersburg, Russia
Birichevskiy A. R., , lehabirich@mail.ru, St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, St.-Petersburg, Russia
Berezin A. N., , a.n.berezin.ru@gmail.com, St.-Petersburg State Electrotechnical University"LETI", St.-Petersburg, Russia
Ryzhkov A. V., , ryzhkov.alex@gmail.com, St.-Petersburg State Electrotechnical University"LETI", St.-Petersburg, Russia
- Keywords
- encryption / deniable encryption / probabilistic encryption / inforcing attack / information security
- Year
- 2013 Issue 2 Pages 18 - 21
- Code EDN
- Code DOI
- Abstract
- It is proposed a method for deniable encryption that consists in encrypting simultaneously two different messages using two different keys. The method uses multiplication operations modulo two different primes and solving the system of two linear congruencies. The proposed deniable-encryption algorithms provide both the indistinguishability of the cryptogram from the cipher text obtained with probabilistic encryption and the using the same decryption algorithm for each of the keys.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy