Sciweavers

Share
169 search results - page 1 / 34
» Deniable authentication and key exchange
Sort
View
CCS
2006
ACM
10 years 3 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CCS
2015
ACM
4 years 7 months ago
Deniable Key Exchanges for Secure Messaging
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the ...
Nik Unger, Ian Goldberg
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
10 years 5 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
9 years 11 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
10 years 6 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
books