International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Deny Whatever You Want: Dual-Deniable Public-Key Encryption

Authors:
Zhiyuan An , Sun Yat-sen University; Guangdong Provincial Key Laboratory of Information Security Technology
Fangguo Zhang , Sun Yat-sen University; Guangdong Provincial Key Laboratory of Information Security Technology
Download:
Search ePrint
Search Google
Conference: PKC 2025
Abstract: We introduce an enhanced requirement of deniable public key encryption that we call dual-deniability. It asks that a sender who is coerced should be able to produce fake randomness, which can explain the target ciphertext as the encryption of any alternative message under any valid key she/he desires to deny. Compared with the original notion of deniability (Canetti et al. in CRYPTO ’97, hereafter named message-deniability), this term further provides a shield for the anonymity of the receiver against coercion attacks. We first give a formal definition of dual-deniability, along with its weak-mode variant. For conceptual understanding, we then show dual-deniability implies semantic security and anonymity against CPA, separates full robustness, and even contradicts key-less or mixed robustness, while is (constructively) implied by key-deniability and full robustness with a minor assumption for bits encryption. As for the availability of dual-deniability, our main scheme is a generic approach from ciphertext-simulatable PKE, where we devise a subtle multi-encryption schema to hide the true message within random masking ciphertexts under plan-ahead setting. Further, we leverage the weak model to present a more efficient scheme having negligible detection probability and constant ciphertext size. Besides, we revisit the notable scheme (Sahai and Waters in STOC ’14) and show it is inherently dual-deniable. Finally, we extend the Boneh-Katz transform to capture CCA security, deriving dual-deniable and CCA-secure PKE from any selectively dual-deniable IBE under multi-TA setting. Overall our work mounts the feasibility of anonymous messaging against coercion attacks.
BibTeX
@inproceedings{pkc-2025-34983,
  title={Deny Whatever You Want: Dual-Deniable Public-Key Encryption},
  publisher={Springer-Verlag},
  author={Zhiyuan An and Fangguo Zhang},
  year=2025
}