Abstract—Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary comes to play with high potential. Deniable encryption plays a key role in the internet/electronic voting, electronic bidding, electronic auctions and secure multiparty computation. In this study a practical efficient receiver deniable encryption scheme based on BCP commitment scheme and idea of Klonowski et al. is proposed. The proposed scheme is a onemove scheme without any pre-encryption information required to be sent between the sender and the receiver prior to encryption. Moreover, the overhead is low in term of the size of the ciphertext. At the same time we compare the typical deniable encryption ...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract:- Electronic voting protocols are a reasonable alternative to conventional elections. Never...
Abstract—A practical efficient receiver deniable encryption scheme based on BCP commitment scheme an...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
In the thesis we study deniable encryption, as proposed by Canetti et al. (CRYPTO 1997). Standard en...
The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different liter...
. Consider a situation in which the transmission of encrypted messages is intercepted by an adversar...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both th...
Consider a situation in which the transmission of encrypted messages is intercepted by anadversary w...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Restricting our discussion to the Yes/No-voting schemes which offer a choice between two options, in...
In this paper we present how multi-party designated verifier signatures can be used as generic solut...
Abstract: In this paper we present how multi-party designated verifier signatures can be used as gen...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract:- Electronic voting protocols are a reasonable alternative to conventional elections. Never...
Abstract—A practical efficient receiver deniable encryption scheme based on BCP commitment scheme an...
The notion of deniable encryption has been known in the literature since its introduction in [1] as ...
In the thesis we study deniable encryption, as proposed by Canetti et al. (CRYPTO 1997). Standard en...
The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different liter...
. Consider a situation in which the transmission of encrypted messages is intercepted by an adversar...
The paper proposes a new method for designing deniable encryption protocols characterized in using R...
The paper proposes new deniable encryption protocols providing bi-deniability in the case of both th...
Consider a situation in which the transmission of encrypted messages is intercepted by anadversary w...
Abstract. Coercion-resistance is the most effective property to fight coercive attacks in Internet e...
Restricting our discussion to the Yes/No-voting schemes which offer a choice between two options, in...
In this paper we present how multi-party designated verifier signatures can be used as generic solut...
Abstract: In this paper we present how multi-party designated verifier signatures can be used as gen...
Abstract. Deniable authentication is a technique that allows one party to send messages to another w...
Remark. Appears in ACNS 2004, this is the full paper. It contains a proof of Theorem 1, some more de...
Abstract:- Electronic voting protocols are a reasonable alternative to conventional elections. Never...