Efficient public-key authenticated deniable encryption schemes

Y Cao, J Wei, F Zhang, Y **ang, X Chen - Computer Standards & Interfaces, 2022 - Elsevier
The notion of deniable encryption (DE) was introduced to achieve secret communications in
situations of coercion or bribery. Generally, it allows a user to open the same ciphertext into …

Building a privacy-preserving blockchain-based bidding system: A crypto approach

HH Chen, PW Chi, YH Chuang - IEEE Access, 2022 - ieeexplore.ieee.org
Blockchain-based bidding systems are becoming increasingly popular nowadays. Due to
the properties of blockchain, bidding records are unchangeable. With existing encryption …

Deniable steganography

Y Xu, Z **a, Z Wang, X Zhang, J Weng - arxiv preprint arxiv:2205.12587, 2022 - arxiv.org
Steganography conceals the secret message into the cover media, generating a stego
media which can be transmitted on public channels without drawing suspicion. As its …

可否认加密技术研究与进展

郝学轩, 曹艳梅, 张方国, 陈晓峰 - Journal of Cryptologic …, 2022 - search.proquest.com
可否认加密技术由Canetti 等人在1997 年引入, 它允许发送方和(或) 接收方,
对已经执行了的一些加密通信, 产生" 伪造的" 随机值, 打开密文到另一条明文消息. 这样 …

[ΑΝΑΦΟΡΑ][C] 发送方可否认图像隐写

徐勇, 夏志华 - **图象图形学报, 2023