False-Bottom Encryption: Deniable Encryption From Secret Sharing

We show how to implement a deniable encryption method from secret sharing. Unlike the related concept of honey encryption, which employs a preprocessing step in symmetric encryption to re-shape the distribution of a plaintext towards making the real plaintext indistinguishable from a ciphertext for...

Full description

Bibliographic Details
Main Authors: Shahzad Ahmad, Stefan Rass, Peter Schartner
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10158701/