Wednesday, 1 February 2012

Function

Deniable encryption allows an encrypted bulletin to be decrypted to altered alive plaintexts, depending on the key used, or contrarily makes it absurd to prove the actuality of the absolute bulletin after the able encryption key. This allows the sender to accept believable deniability if accountable to accord up his or her encryption key. The angle of "deniable encryption" was acclimated by Julian Assange and Ralf Weinmann in the Rubberhose filesystem1 and explored in detail in a cardboard by Ran Canetti, Cynthia Dwork, Moni Naor, and Rafail Ostrovsky2 in 1996.

No comments:

Post a Comment