4.6 Article

Abuse-resistant deniable encryption

Journal

COMPUTER STANDARDS & INTERFACES
Volume 87, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.csi.2023.103761

Keywords

Deniable encryption; Malicious user; Abuse resistance

Ask authors/readers for more resources

Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.
Deniable encryption (DE) allows private communication over an insecure channel even under the coercion. That is, after an adversary forces communication participants to reveal their secret keys and randomness used during the communication, the message confidentiality can still be preserved. Since its introduction, a large body of studies have been made to improve the DE system in terms of efficiency, security definition and functionality, which is the focus of this paper. However, as far as we know, none of existing DE systems considers the abuse of deniability caused by malicious users, which is a crucial feature from the view of practical applications of DE. For instance, a malicious user (e.g., an employee who holds some sensitive documents and intends to sell these confidential contents for obtaining financial gain) can utilize a DE system to transmit the confidential content without the risk of being caught, which is extremely dangerous to the interests and security of his/her organization. In this paper, to mitigate this threat, we formally define the syntax and security notions of abuse-resistant deniable encryption, which restricts what users can deny. Then, we put forward a concrete construction of abuse-resistant DE scheme, and prove its security under the assumptions of indistinguishability obfuscation and one-way function. Compared with other related work, the proposed construction has advantages in terms of functionality and ciphertext rate simultaneously.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available