About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

Download(Requires a free EAI acccount)
501 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_23,
        author={Ning Ding and Dawu Gu and Zhiqiang Liu},
        title={Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={Symmetric Encryption Obfuscation Anti-forensics},
        doi={10.1007/978-3-642-23602-0_23}
    }
    
  • Ning Ding
    Dawu Gu
    Zhiqiang Liu
    Year: 2012
    Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_23
Ning Ding1,*, Dawu Gu1,*, Zhiqiang Liu1,*
  • 1: Shanghai Jiao Tong University
*Contact email: dingning@sjtu.edu.cn, dwgu@sjtu.edu.cn, ilu_zq@sjtu.edu.cn

Abstract

In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt a cipher text he encrypted to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is catched by the forensics investigator and ordered to hand over the key for decryption.

Keywords
Symmetric Encryption Obfuscation Anti-forensics
Published
2012-10-10
http://dx.doi.org/10.1007/978-3-642-23602-0_23
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL