搜索结果: 1-3 共查到“Deniable encryption”相关记录3条 . 查询时间(0.062 秒)
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Indistinguishability Obfuscation Deniable Encryption
2014/3/11
We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems. We use this technique to carry out a systematic study of the ap...
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
public-key cryptography / Deniable encryption electronic voting, multi-party computation
2012/3/29
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific cip...
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Deniable encryption electronic voting multi-party computation
2011/2/23
Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific cip...