Thesis (Selection of subject)Thesis (Selection of subject)(version: 368)
Thesis details
   Login via CAS
Deniable encryption
Thesis title in Czech: Popiratelné šifrování
Thesis title in English: Deniable encryption
Key words: popiratelné šifrování, věrohodná popiratelnost, simulovatelné šifrování, průsvitné množiny, mřížová kryptografie
English key words: deniable encryption, plausible deniability, simulatable encryption, translucent sets, lattice cryptography
Academic year of topic announcement: 2011/2012
Thesis type: diploma thesis
Thesis language: angličtina
Department: Department of Algebra (32-KA)
Supervisor: doc. RNDr. Jiří Tůma, DrSc.
Author: hidden - assigned and confirmed by the Study Dept.
Date of registration: 19.06.2012
Date of assignment: 19.06.2012
Confirmed by Study dept. on: 21.06.2012
Date and time of defence: 20.09.2012 00:00
Date of electronic submission:02.08.2012
Date of submission of printed version:03.08.2012
Date of proceeded defence: 20.09.2012
Opponents: prof. RNDr. Jan Krajíček, DrSc.
 
 
 
Guidelines
To study the fundamental paper on deniable encryption
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky, Deniable encryption, http://www.cs.ucla.edu/~rafail/PUBLIC/29.pdf.

To study new proposals of schemes for deniable encryption in the papers
Marek Klonowski, Przemysław Kubiak, and Mirosław Kutyłowski, Practical Deniable Encryption, SOFSEM 2008: Theory and Practice of Computer Science
Lecture Notes in Computer Science, 2008, Volume 4910/2008, 599-609,
http://www.springerlink.com/content/h54340392n74jp2m/fulltext.pdf.
and
Adam O'Neill, Chris Peikert, Brent Waters: Bi-Deniable Public-Key Encryption. CRYPTO 2011: 525-542

To propose a unified conceptual framework for deniable encryption schemes of various types.

To propose improvements of existing schemes for deniable encryption.

To describe some of the existing implementations of deniable encryption schemes.

References
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky, Deniable encryption, http://www.cs.ucla.edu/~rafail/PUBLIC/29.pdf

Marek Klonowski, Przemysław Kubiak, and Mirosław Kutyłowski, Practical Deniable Encryption, SOFSEM 2008: Theory and Practice of Computer Science
Lecture Notes in Computer Science, 2008, Volume 4910/2008, 599-609,
http://www.springerlink.com/content/h54340392n74jp2m/fulltext.pdf

Angela Irwin and Ray Hunt, Forensic Methods for Detection of Deniable Encryption in Mobile Networks, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5291379

Adam O'Neill, Chris Peikert, Brent Waters: Bi-Deniable Public-Key Encryption. CRYPTO 2011: 525-542

Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi: Lower and Upper Bounds for Deniable Public-Key Encryption. ASIACRYPT 2011: 125-142
 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html