Deniable Encryption View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2006-05-17

AUTHORS

Rein Canetti , Cynthia Dwork , Moni Naor , Rafail Ostrovsky

ABSTRACT

Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the ciphertext, thereby exposing the cleartext. An encryption scheme is deniable if the sender can generate 'fake random choices' that will make the ciphertext ‘look like’ an encryption of a different cleartext, thus keeping the real cleartext private. Analogous requirements can be formulated with respect to attacking the receiver and with respect to attacking both parties. In this paper we introduce deniable encryption and propose constructions of schemes with polynomial deniability. In addition to being interesting by itself, and having several applications, deniable encryption provides a simplified and elegant construction of adoptively secure multiparty computation. More... »

PAGES

90-104

Book

TITLE

Advances in Cryptology — CRYPTO '97

ISBN

978-3-540-63384-6
978-3-540-69528-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/bfb0052229

DOI

http://dx.doi.org/10.1007/bfb0052229

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000706296


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "IBM Research \u2013 Thomas J. Watson Research Center", 
          "id": "https://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J. Watson Research Center, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canetti", 
        "givenName": "Rein", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM Research - Almaden", 
          "id": "https://www.grid.ac/institutes/grid.481551.c", 
          "name": [
            "IBM Almaden Research Center, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dwork", 
        "givenName": "Cynthia", 
        "id": "sg:person.016065712157.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065712157.59"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Dept. of Computer Science, The Weizmann Institute, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naor", 
        "givenName": "Moni", 
        "id": "sg:person.07776170271.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ericsson (United States)", 
          "id": "https://www.grid.ac/institutes/grid.432790.b", 
          "name": [
            "Bell Communications Research, MCC 1C-365B, Morristown, N.J."
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ostrovsky", 
        "givenName": "Rafail", 
        "id": "sg:person.015474716573.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015474716573.95"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/0022-0000(84)90070-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035604833"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/100216.100273", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045710242"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2006-05-17", 
    "datePublishedReg": "2006-05-17", 
    "description": "Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the ciphertext, thereby exposing the cleartext. An encryption scheme is deniable if the sender can generate 'fake random choices' that will make the ciphertext \u2018look like\u2019 an encryption of a different cleartext, thus keeping the real cleartext private. Analogous requirements can be formulated with respect to attacking the receiver and with respect to attacking both parties. In this paper we introduce deniable encryption and propose constructions of schemes with polynomial deniability. In addition to being interesting by itself, and having several applications, deniable encryption provides a simplified and elegant construction of adoptively secure multiparty computation.", 
    "editor": [
      {
        "familyName": "Kaliski", 
        "givenName": "Burton S.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/bfb0052229", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-63384-6", 
        "978-3-540-69528-8"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO '97", 
      "type": "Book"
    }, 
    "name": "Deniable Encryption", 
    "pagination": "90-104", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000706296"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/bfb0052229"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "035d0331a21173199880e7914ee13f8a246b5e741bf56ece39615fb60d746c28"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/bfb0052229", 
      "https://app.dimensions.ai/details/publication/pub.1000706296"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T08:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000369_0000000369/records_68950_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2FBFb0052229"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/bfb0052229'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/bfb0052229'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/bfb0052229'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/bfb0052229'


 

This table displays all metadata directly associated to this object as RDF triples.

99 TRIPLES      23 PREDICATES      28 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/bfb0052229 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N6e0f879665d84144945ac0c89958beac
4 schema:citation https://doi.org/10.1016/0022-0000(84)90070-9
5 https://doi.org/10.1145/100216.100273
6 schema:datePublished 2006-05-17
7 schema:datePublishedReg 2006-05-17
8 schema:description Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the ciphertext, thereby exposing the cleartext. An encryption scheme is deniable if the sender can generate 'fake random choices' that will make the ciphertext ‘look like’ an encryption of a different cleartext, thus keeping the real cleartext private. Analogous requirements can be formulated with respect to attacking the receiver and with respect to attacking both parties. In this paper we introduce deniable encryption and propose constructions of schemes with polynomial deniability. In addition to being interesting by itself, and having several applications, deniable encryption provides a simplified and elegant construction of adoptively secure multiparty computation.
9 schema:editor Nf011a22404354744abe550518d3f5672
10 schema:genre chapter
11 schema:inLanguage en
12 schema:isAccessibleForFree true
13 schema:isPartOf Ne409d5505ac8427b9dda7b2dc7305471
14 schema:name Deniable Encryption
15 schema:pagination 90-104
16 schema:productId N094686746bfc441f9c91481fb47027ed
17 N1a91b5a0ecf24fb696dd1d653a4de643
18 Nc0bd6aa2a2c1488298f1e863f53a17ff
19 schema:publisher N3bb8aed31b894ce8b938c9dd910dd66f
20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000706296
21 https://doi.org/10.1007/bfb0052229
22 schema:sdDatePublished 2019-04-16T08:55
23 schema:sdLicense https://scigraph.springernature.com/explorer/license/
24 schema:sdPublisher Nb3ec2bed05be4aea9097f8c6c2cd9e6e
25 schema:url https://link.springer.com/10.1007%2FBFb0052229
26 sgo:license sg:explorer/license/
27 sgo:sdDataset chapters
28 rdf:type schema:Chapter
29 N094686746bfc441f9c91481fb47027ed schema:name dimensions_id
30 schema:value pub.1000706296
31 rdf:type schema:PropertyValue
32 N1a91b5a0ecf24fb696dd1d653a4de643 schema:name doi
33 schema:value 10.1007/bfb0052229
34 rdf:type schema:PropertyValue
35 N36ea6da1301a4908bf66a589237827a0 rdf:first sg:person.016065712157.59
36 rdf:rest N89d4e59f0c594f67b8271662e301d10b
37 N3bb8aed31b894ce8b938c9dd910dd66f schema:location Berlin, Heidelberg
38 schema:name Springer Berlin Heidelberg
39 rdf:type schema:Organisation
40 N496b2c229f014201a3efb726914ad008 rdf:first sg:person.015474716573.95
41 rdf:rest rdf:nil
42 N6e0f879665d84144945ac0c89958beac rdf:first N886d43d002f14e5ca7d10a986820d1f5
43 rdf:rest N36ea6da1301a4908bf66a589237827a0
44 N886d43d002f14e5ca7d10a986820d1f5 schema:affiliation https://www.grid.ac/institutes/grid.481554.9
45 schema:familyName Canetti
46 schema:givenName Rein
47 rdf:type schema:Person
48 N89d4e59f0c594f67b8271662e301d10b rdf:first sg:person.07776170271.83
49 rdf:rest N496b2c229f014201a3efb726914ad008
50 Na7297cadf718432cb2b4c29f27729069 schema:name Dept. of Computer Science, The Weizmann Institute, USA
51 rdf:type schema:Organization
52 Nb3ec2bed05be4aea9097f8c6c2cd9e6e schema:name Springer Nature - SN SciGraph project
53 rdf:type schema:Organization
54 Nc0bd6aa2a2c1488298f1e863f53a17ff schema:name readcube_id
55 schema:value 035d0331a21173199880e7914ee13f8a246b5e741bf56ece39615fb60d746c28
56 rdf:type schema:PropertyValue
57 Ne409d5505ac8427b9dda7b2dc7305471 schema:isbn 978-3-540-63384-6
58 978-3-540-69528-8
59 schema:name Advances in Cryptology — CRYPTO '97
60 rdf:type schema:Book
61 Nf011a22404354744abe550518d3f5672 rdf:first Nffef6cccdfc54b979952fe5361aba33c
62 rdf:rest rdf:nil
63 Nffef6cccdfc54b979952fe5361aba33c schema:familyName Kaliski
64 schema:givenName Burton S.
65 rdf:type schema:Person
66 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
67 schema:name Information and Computing Sciences
68 rdf:type schema:DefinedTerm
69 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
70 schema:name Data Format
71 rdf:type schema:DefinedTerm
72 sg:person.015474716573.95 schema:affiliation https://www.grid.ac/institutes/grid.432790.b
73 schema:familyName Ostrovsky
74 schema:givenName Rafail
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015474716573.95
76 rdf:type schema:Person
77 sg:person.016065712157.59 schema:affiliation https://www.grid.ac/institutes/grid.481551.c
78 schema:familyName Dwork
79 schema:givenName Cynthia
80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016065712157.59
81 rdf:type schema:Person
82 sg:person.07776170271.83 schema:affiliation Na7297cadf718432cb2b4c29f27729069
83 schema:familyName Naor
84 schema:givenName Moni
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83
86 rdf:type schema:Person
87 https://doi.org/10.1016/0022-0000(84)90070-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035604833
88 rdf:type schema:CreativeWork
89 https://doi.org/10.1145/100216.100273 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045710242
90 rdf:type schema:CreativeWork
91 https://www.grid.ac/institutes/grid.432790.b schema:alternateName Ericsson (United States)
92 schema:name Bell Communications Research, MCC 1C-365B, Morristown, N.J.
93 rdf:type schema:Organization
94 https://www.grid.ac/institutes/grid.481551.c schema:alternateName IBM Research - Almaden
95 schema:name IBM Almaden Research Center, USA
96 rdf:type schema:Organization
97 https://www.grid.ac/institutes/grid.481554.9 schema:alternateName IBM Research – Thomas J. Watson Research Center
98 schema:name IBM T.J. Watson Research Center, USA
99 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...