Can the Government Compel Decryption?: Don't Trust - Verify
Abstract
Supplementary Material
- Download
- 277.61 MB
References
Index Terms
- Can the Government Compel Decryption?: Don't Trust - Verify
Recommendations
Deniable encryptions secure against adaptive chosen ciphertext attack
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and ExperienceThe deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or the receiver is coerced to show the plaintext and the used random numbers in encryption, a deniable encryption scheme ...
Deniable Searchable Symmetric Encryption
In the recent years, Searchable Symmetric Encryption (SSE) has become one of the hottest topic in cloud-computing area because of its availability and flexibility, and there are a series of SSE schemes were proposed. The adversary considered in these ...
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack
INCOS '12: Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative SystemsThe deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information in encrypting a normal message. Even if the sender or the receiver is coerced to show the plaintext and the random coins in the ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Daniel J. Weitzner,
- Program Chairs:
- Joan Feigenbaum,
- Christopher S. Yoo
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Princeton University Center for Information Technology Policy
- NSF (National Science Foundation)
- DARPA
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 246Total Downloads
- Downloads (Last 12 months)150
- Downloads (Last 6 weeks)33
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in