Improvement of an ID-based deniable authentication protocol

被引:0
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 15 条
[1]  
Dwork C., Nair M., Sahai A., Concurrent zeroknowledge, in Proc. of the 30th Annual ACM Symposium on Theory of Computing, pp. 409-418, (1998)
[2]  
Aumann Y., Rabin M., Efficient deniable authentication of long message, (1998)
[3]  
Shao Z., Efficient deniable authentication protocol based on generalized elgamal signature scheme, Computer Standards & Interfaces, 26, 5, pp. 449-454, (2004)
[4]  
Lu R., Cao Z., A new deniable authentication protocol from bilinear pairings, Applied Mathematics and Computation, 168, 2, pp. 954-961, (2005)
[5]  
Rahman N.N.A., Ariffin M.R.K., The development of deniable authentication protocol based on the bivariate function hard problem, Intl. Journal of Network Security, 18, 1, pp. 151-157, (2016)
[6]  
Lee W.-B., Wu C.-C., Tsaur W.-J., A novel deniable authentication protocol using generalized elgamal signature scheme, Information Sciences, 177, 6, pp. 1376-1381, (2007)
[7]  
Zhang Y., Xu Q., Liu Z., A new non-interactive deniable authentication protocol based on generalized Elgamal signature scheme, in Proc. of the 6th. IEEE Joint Intl. Information Technology and Artificial Intelligence Conf, pp. 193-197, (2011)
[8]  
Liu C.-Y., Lee C.-C., Lin T.-C., Cryptanalysis of an efficient deniable authentication protocol based on generalized elgamal signature scheme, Intl. Journal of Network Security, 12, 1, pp. 58-60, (2011)
[9]  
Kar J., ID-based deniable authentication protocol based on diffie-hellman problem on elliptic curve, Intl. Journal of Network Security, 15, 5, pp. 357-364, (2013)
[10]  
Yoon E.-J., Security analysis of Kar's ID-based deniable authentication protocol, Contemporary Engineering Sciences, 8, 17, pp. 765-771, (2015)