2020
DOI: 10.1007/978-3-030-56784-2_27
|View full text |Cite
|
Sign up to set email alerts
|

Fully Deniable Interactive Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…However, the deployment of a PD system already raises suspicion about the existence of sensitive data. A similar issue also exists for deniable encryption [7,6].…”
Section: Invisible Pdmentioning
confidence: 87%
See 1 more Smart Citation
“…However, the deployment of a PD system already raises suspicion about the existence of sensitive data. A similar issue also exists for deniable encryption [7,6].…”
Section: Invisible Pdmentioning
confidence: 87%
“…The scheme Σ is said to achieve single-snapshot PD if the winning probability of  is ≤ 1 2 + ( ), where ( ) is a negligible function on the security parameter . 6 This game extends to capture multi-snapshot security by allowing  to access the device state at the end of each round.…”
Section: Adversary Modelmentioning
confidence: 99%
“…This game is played between a coercive adversary  and a challenger  running a PD scheme Σ.  only knows (for the public data that the scheme is not trying to hide), but not 6 .…”
Section: Unified Definitionmentioning
confidence: 99%
“…• Multiparty non-interactive key exchange in the plain model (without trusted setup), e.g., [34,95]. [111], and fully deniable interactive encryption [51]. • Constant round concurrent zero-knowledge protocols for any NP language [57].…”
Section: Implications Of 𝑖Omentioning
confidence: 99%