Talk:Deniable authentication

Sourcing
The only source provided does not mention "deniable authentication", only "plausible deniability". Indeed, the deniability measures are quite weak and could hardly ensure deniability. Perhaps this should be renamed "Plausibly deniable authentication". --Chealer (talk) 00:45, 29 October 2014 (UTC)


 * I have provided a few references discussing deniable authentication. I believe the term "deniable authentication" can be used to describe both plausible deniability and full deniability, so I don't see any need for renaming. AFAICT according to the definition in the L. Harn et al. paper, OTR actually provides 1-out-of-&infin;, or full deniability. See section 4.4 Revealing MAC keys in the OTR paper. But I'm not confident enough to add that claim to the article. -- intgr [talk] 13:23, 29 October 2014 (UTC)

Merging with Deniable Encryption
I believe this page should be merged with Deniable Encryption. This page is a stub page and much of its information is either redundant or just isn't long enough to deserve a page on its own. Deniable Encryption already has its own section on this topic. Merging could be done with only very minor editing.

Suggestions: add the first paragraph of the source to the beginning of the first paragraph of the destination.

I was about to do this by myself, but I saw links made to Deniable Authentication on the destination section and figured I should run this by someone else first, since someone has probably already thought this over. Thanks -- bonkmaykr .xyz  TALK  14:07, 28 December 2023 (UTC)