False-Bottom Encryption: Deniable Encryption from Secret Sharing

نویسندگان

چکیده

We show how to implement a deniable encryption method from secret sharing. Unlike the related concept of honey encryption, which employs preprocessing step in symmetric re-shape distribution plaintext towards making real indistinguishable ciphertext for fake message, we can avoid both, computational intractability assumptions and data. This accomplishes deniability against an attacker that force decryptions, it brute-force break with sufficient power. Following plausible deniability, herein have different decryption keys open up distinct plaintexts within same ciphertext. For instance, revealed key was shared by victim under duress, will convince is real, while actual remains unnoticed. False Bottom Encryption constructs scheme (in sense using encrypt decrypt) shares properties both encryption. specifically formalize differentiate “deniable” “plausibly deniable” as security feature, showing falls back (only) depending on distribution. Our simple, lightweight efficient terms decryption, based As such, do not rely intractability. corroborate construction giving numeric examples providing implementations Jupyter notebook supplementary this work.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homomorphic Secret Sharing from Paillier Encryption

A recent breakthrough by Boyle et al. [7] demonstrated secure function evaluation protocols for branching programs, where the communication complexity is sublinear in the size of the circuit (indeed just linear in the size of the inputs, and polynomial in the security parameter). Their result is based on the Decisional Diffie-Hellman assumption (DDH), using (variants of) the ElGamal cryptosyste...

متن کامل

Deniable Encryption

Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the ciphertext, thereby exposing the cleartext. An encryption scheme is deniable if the sender can generate ‘fake random choices’ that will make the ciphertext ‘look like’ an encr...

متن کامل

Stream Deniable-Encryption Algorithms

A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...

متن کامل

Separating Sources for Encryption and Secret Sharing

Most cryptographic primitives such as encryption, authentication or secret sharing require randomness. Usually one assumes that perfect randomness is available, but those primitives might also be realized under weaker assumptions. In this work we continue the study of building secure cryptographic primitives from imperfect random sources initiated by Dodis and Spencer (FOCS’02). Their main resu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3288285