Pseudo-probabilistic block ciphers and their randomization View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-05

AUTHORS

Moldovyan Nikolay Andreevich, Moldovyan Alexander Andreevich, Tam Nguyen Duc, Hai Nguyen Nam, Manh Cong Tran, Minh Nguyen Hieu

ABSTRACT

There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudo-probabilistic block ciphers. The proposed method includes encryption of the secret message block and the fake message block followed by a transformation procedure mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The transformation procedure is implemented in the following two variants: (1) simultaneous encryption of the intermediate ciphertext blocks and (2) solving the system of two linear congruencies. The second variant provides natural possibility to construct pseudo-probabilistic block ciphers in which recovering fake or secret message is performed using the same single decryption algorithm. To provide higher security there are proposed randomized pseudo-probabilistic ciphers. There are also considered designs with different size of the input data blocks corresponding to fake and secret messages. More... »

PAGES

1977-1984

References to SciGraph publications

  • 2006-05-17. Deniable Encryption in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • 2011. Efficient Non-interactive Secure Computation in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2011
  • 2011. Bi-Deniable Public-Key Encryption in ADVANCES IN CRYPTOLOGY – CRYPTO 2011
  • 2011. Deniable Encryption with Negligible Detection Probability: An Interactive Construction in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2011
  • 2003. Fundamentals of Computer Security in NONE
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s12652-018-0791-6

    DOI

    http://dx.doi.org/10.1007/s12652-018-0791-6

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1103623587


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "St. Petersburg Institute for Informatics and Automation", 
              "id": "https://www.grid.ac/institutes/grid.465356.7", 
              "name": [
                "St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, 199178, St. Petersburg, Russia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Andreevich", 
            "givenName": "Moldovyan Nikolay", 
            "id": "sg:person.014621574514.77", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014621574514.77"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "ITMO University", 
              "id": "https://www.grid.ac/institutes/grid.35915.3b", 
              "name": [
                "ITMO University, 197101, St. Petersburg, Russia"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Andreevich", 
            "givenName": "Moldovyan Alexander", 
            "id": "sg:person.015417155114.18", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015417155114.18"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Academy of Cryptography Techniques, Hanoi, Vietnam"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Duc", 
            "givenName": "Tam Nguyen", 
            "id": "sg:person.016214535514.81", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016214535514.81"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Academy of Cryptography Techniques, Hanoi, Vietnam"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Nam", 
            "givenName": "Hai Nguyen", 
            "id": "sg:person.07511464314.33", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07511464314.33"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Le Quy Don Technical University", 
              "id": "https://www.grid.ac/institutes/grid.440802.a", 
              "name": [
                "Le Quy Don Technical University, Hanoi, Vietnam"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tran", 
            "givenName": "Manh Cong", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Academy of Cryptography Techniques, Hanoi, Vietnam"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hieu", 
            "givenName": "Minh Nguyen", 
            "id": "sg:person.011527244701.35", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011527244701.35"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1000335585", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-07324-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000335585", 
              "https://doi.org/10.1007/978-3-662-07324-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-07324-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000335585", 
              "https://doi.org/10.1007/978-3-662-07324-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000408710", 
              "https://doi.org/10.1007/978-3-642-20465-4_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000408710", 
              "https://doi.org/10.1007/978-3-642-20465-4_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052229", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000706296", 
              "https://doi.org/10.1007/bfb0052229"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0052229", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000706296", 
              "https://doi.org/10.1007/bfb0052229"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22792-9_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033448011", 
              "https://doi.org/10.1007/978-3-642-22792-9_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22792-9_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033448011", 
              "https://doi.org/10.1007/978-3-642-22792-9_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047290892", 
              "https://doi.org/10.1007/978-3-642-20465-4_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047290892", 
              "https://doi.org/10.1007/978-3-642-20465-4_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3837/tiis.2014.09.016", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1071450193"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.4304/jnw.4.5.370-377", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1072450241"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1201/9781420054125", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095905369"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-05", 
        "datePublishedReg": "2019-05-01", 
        "description": "There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudo-probabilistic block ciphers. The proposed method includes encryption of the secret message block and the fake message block followed by a transformation procedure mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The transformation procedure is implemented in the following two variants: (1) simultaneous encryption of the intermediate ciphertext blocks and (2) solving the system of two linear congruencies. The second variant provides natural possibility to construct pseudo-probabilistic block ciphers in which recovering fake or secret message is performed using the same single decryption algorithm. To provide higher security there are proposed randomized pseudo-probabilistic ciphers. There are also considered designs with different size of the input data blocks corresponding to fake and secret messages.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s12652-018-0791-6", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1043999", 
            "issn": [
              "1868-5137", 
              "1868-5145"
            ], 
            "name": "Journal of Ambient Intelligence and Humanized Computing", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "5", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "10"
          }
        ], 
        "name": "Pseudo-probabilistic block ciphers and their randomization", 
        "pagination": "1977-1984", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "15716c3695c95c8b06768bc433097e3749aecafb262b42a2edf8167158075b68"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s12652-018-0791-6"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1103623587"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s12652-018-0791-6", 
          "https://app.dimensions.ai/details/publication/pub.1103623587"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T13:58", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000371_0000000371/records_130820_00000005.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs12652-018-0791-6"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0791-6'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0791-6'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0791-6'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-018-0791-6'


     

    This table displays all metadata directly associated to this object as RDF triples.

    138 TRIPLES      21 PREDICATES      36 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s12652-018-0791-6 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N03a241c5593b4e67b2cfa477b2b9721e
    4 schema:citation sg:pub.10.1007/978-3-642-20465-4_23
    5 sg:pub.10.1007/978-3-642-20465-4_33
    6 sg:pub.10.1007/978-3-642-22792-9_30
    7 sg:pub.10.1007/978-3-662-07324-7
    8 sg:pub.10.1007/bfb0052229
    9 https://app.dimensions.ai/details/publication/pub.1000335585
    10 https://doi.org/10.1201/9781420054125
    11 https://doi.org/10.3837/tiis.2014.09.016
    12 https://doi.org/10.4304/jnw.4.5.370-377
    13 schema:datePublished 2019-05
    14 schema:datePublishedReg 2019-05-01
    15 schema:description There is considered implementation of the plan-ahead share-key deniable encryption algorithms that produce the cryptogram that satisfy criterion of the computational indistinguishability from probabilistic encryption of the fake message. This paper introduces a general design of the pseudo-probabilistic block ciphers. The proposed method includes encryption of the secret message block and the fake message block followed by a transformation procedure mapping the pair of intermediate ciphertext blocks into a single block of the output ciphertext. The transformation procedure is implemented in the following two variants: (1) simultaneous encryption of the intermediate ciphertext blocks and (2) solving the system of two linear congruencies. The second variant provides natural possibility to construct pseudo-probabilistic block ciphers in which recovering fake or secret message is performed using the same single decryption algorithm. To provide higher security there are proposed randomized pseudo-probabilistic ciphers. There are also considered designs with different size of the input data blocks corresponding to fake and secret messages.
    16 schema:genre research_article
    17 schema:inLanguage en
    18 schema:isAccessibleForFree false
    19 schema:isPartOf N447fd5f53c924f0398bd1da2d0983420
    20 Na0f103aeb4524195b50964099b983d40
    21 sg:journal.1043999
    22 schema:name Pseudo-probabilistic block ciphers and their randomization
    23 schema:pagination 1977-1984
    24 schema:productId N2a7b447446f348cfae78bda6f4da7fbd
    25 Nb9a5b15b0de4400f80832a0c931f2432
    26 Nba195fc541e8462d97e7c264601255b7
    27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1103623587
    28 https://doi.org/10.1007/s12652-018-0791-6
    29 schema:sdDatePublished 2019-04-11T13:58
    30 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    31 schema:sdPublisher N46215110fa4c4083807478ad27c9cce8
    32 schema:url https://link.springer.com/10.1007%2Fs12652-018-0791-6
    33 sgo:license sg:explorer/license/
    34 sgo:sdDataset articles
    35 rdf:type schema:ScholarlyArticle
    36 N0297af5ccc1f4c9fa2f2bb197a020d6a schema:name Academy of Cryptography Techniques, Hanoi, Vietnam
    37 rdf:type schema:Organization
    38 N03a241c5593b4e67b2cfa477b2b9721e rdf:first sg:person.014621574514.77
    39 rdf:rest N4b4e183fc940446c8cfb890c67b7b14b
    40 N2a7b447446f348cfae78bda6f4da7fbd schema:name dimensions_id
    41 schema:value pub.1103623587
    42 rdf:type schema:PropertyValue
    43 N447fd5f53c924f0398bd1da2d0983420 schema:volumeNumber 10
    44 rdf:type schema:PublicationVolume
    45 N46215110fa4c4083807478ad27c9cce8 schema:name Springer Nature - SN SciGraph project
    46 rdf:type schema:Organization
    47 N4a5767d92be94692a837d5d2eaf76511 rdf:first sg:person.011527244701.35
    48 rdf:rest rdf:nil
    49 N4b4e183fc940446c8cfb890c67b7b14b rdf:first sg:person.015417155114.18
    50 rdf:rest Nbe202e92736c492ebf00b1b3ad54d675
    51 N8eb069f811b946aea21cdd9665cf8c0e schema:name Academy of Cryptography Techniques, Hanoi, Vietnam
    52 rdf:type schema:Organization
    53 N98cd0da69fa34ee0ab73259b6b133527 rdf:first sg:person.07511464314.33
    54 rdf:rest Naa8b71a4a466465f9aeff0f47446f60c
    55 Na0f103aeb4524195b50964099b983d40 schema:issueNumber 5
    56 rdf:type schema:PublicationIssue
    57 Naa8b71a4a466465f9aeff0f47446f60c rdf:first Nf0aea5941f384f7c9660e79b5e8304ea
    58 rdf:rest N4a5767d92be94692a837d5d2eaf76511
    59 Nb9a5b15b0de4400f80832a0c931f2432 schema:name doi
    60 schema:value 10.1007/s12652-018-0791-6
    61 rdf:type schema:PropertyValue
    62 Nba195fc541e8462d97e7c264601255b7 schema:name readcube_id
    63 schema:value 15716c3695c95c8b06768bc433097e3749aecafb262b42a2edf8167158075b68
    64 rdf:type schema:PropertyValue
    65 Nbb8fba674741438098dd1449a99eaa4f schema:name Academy of Cryptography Techniques, Hanoi, Vietnam
    66 rdf:type schema:Organization
    67 Nbe202e92736c492ebf00b1b3ad54d675 rdf:first sg:person.016214535514.81
    68 rdf:rest N98cd0da69fa34ee0ab73259b6b133527
    69 Nf0aea5941f384f7c9660e79b5e8304ea schema:affiliation https://www.grid.ac/institutes/grid.440802.a
    70 schema:familyName Tran
    71 schema:givenName Manh Cong
    72 rdf:type schema:Person
    73 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    74 schema:name Information and Computing Sciences
    75 rdf:type schema:DefinedTerm
    76 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Data Format
    78 rdf:type schema:DefinedTerm
    79 sg:journal.1043999 schema:issn 1868-5137
    80 1868-5145
    81 schema:name Journal of Ambient Intelligence and Humanized Computing
    82 rdf:type schema:Periodical
    83 sg:person.011527244701.35 schema:affiliation N8eb069f811b946aea21cdd9665cf8c0e
    84 schema:familyName Hieu
    85 schema:givenName Minh Nguyen
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011527244701.35
    87 rdf:type schema:Person
    88 sg:person.014621574514.77 schema:affiliation https://www.grid.ac/institutes/grid.465356.7
    89 schema:familyName Andreevich
    90 schema:givenName Moldovyan Nikolay
    91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014621574514.77
    92 rdf:type schema:Person
    93 sg:person.015417155114.18 schema:affiliation https://www.grid.ac/institutes/grid.35915.3b
    94 schema:familyName Andreevich
    95 schema:givenName Moldovyan Alexander
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015417155114.18
    97 rdf:type schema:Person
    98 sg:person.016214535514.81 schema:affiliation N0297af5ccc1f4c9fa2f2bb197a020d6a
    99 schema:familyName Duc
    100 schema:givenName Tam Nguyen
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016214535514.81
    102 rdf:type schema:Person
    103 sg:person.07511464314.33 schema:affiliation Nbb8fba674741438098dd1449a99eaa4f
    104 schema:familyName Nam
    105 schema:givenName Hai Nguyen
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07511464314.33
    107 rdf:type schema:Person
    108 sg:pub.10.1007/978-3-642-20465-4_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000408710
    109 https://doi.org/10.1007/978-3-642-20465-4_23
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-642-20465-4_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047290892
    112 https://doi.org/10.1007/978-3-642-20465-4_33
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-642-22792-9_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033448011
    115 https://doi.org/10.1007/978-3-642-22792-9_30
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/978-3-662-07324-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000335585
    118 https://doi.org/10.1007/978-3-662-07324-7
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/bfb0052229 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000706296
    121 https://doi.org/10.1007/bfb0052229
    122 rdf:type schema:CreativeWork
    123 https://app.dimensions.ai/details/publication/pub.1000335585 schema:CreativeWork
    124 https://doi.org/10.1201/9781420054125 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095905369
    125 rdf:type schema:CreativeWork
    126 https://doi.org/10.3837/tiis.2014.09.016 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071450193
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.4304/jnw.4.5.370-377 schema:sameAs https://app.dimensions.ai/details/publication/pub.1072450241
    129 rdf:type schema:CreativeWork
    130 https://www.grid.ac/institutes/grid.35915.3b schema:alternateName ITMO University
    131 schema:name ITMO University, 197101, St. Petersburg, Russia
    132 rdf:type schema:Organization
    133 https://www.grid.ac/institutes/grid.440802.a schema:alternateName Le Quy Don Technical University
    134 schema:name Le Quy Don Technical University, Hanoi, Vietnam
    135 rdf:type schema:Organization
    136 https://www.grid.ac/institutes/grid.465356.7 schema:alternateName St. Petersburg Institute for Informatics and Automation
    137 schema:name St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, 199178, St. Petersburg, Russia
    138 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...