Efficient public-key authenticated deniable encryption schemes
The notion of deniable encryption (DE) was introduced to achieve secret communications in
situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into …
situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into …
Building a privacy-preserving blockchain-based bidding system: A crypto approach
Blockchain-based bidding systems are becoming increasingly popular nowadays. Due to
the properties of blockchain, bidding records are unchangeable. With existing encryption …
the properties of blockchain, bidding records are unchangeable. With existing encryption …
Deniable steganography
Steganography conceals the secret message into the cover media, generating a stego
media which can be transmitted on public channels without drawing suspicion. As its …
media which can be transmitted on public channels without drawing suspicion. As its …
可否认加密技术研究与进展
郝学轩, 曹艳梅, 张方国, 陈晓峰 - Journal of Cryptologic …, 2022 - search.proquest.com
可否认加密技术由Canetti 等人在1997 年引入, 它允许发送方和(或) 接收方,
对已经执行了的一些加密通信, 产生" 伪造的" 随机值, 打开密文到另一条明文消息. 这样 …
对已经执行了的一些加密通信, 产生" 伪造的" 随机值, 打开密文到另一条明文消息. 这样 …
[ΑΝΑΦΟΡΑ][C] 发送方可否认图像隐写
徐勇, 夏志华 - **图象图形学报, 2023