Improvement of an ID-based deniable authentication protocol

被引:0
|
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 50 条
  • [41] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS
    Cheremushkin, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85
  • [42] A Practical ID-Based Group Signature Scheme
    Cheng, Xiangguo
    Zhou, Shaojie
    Yu, Jia
    Li, Xin
    Ma, Huiran
    JOURNAL OF COMPUTERS, 2012, 7 (11) : 2650 - 2654
  • [43] Non-interactive identity based deniable authentication scheme
    Kuo, Wen-Chung
    Huang, Yu-Chih
    PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2008, 7 : 353 - 356
  • [44] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853
  • [45] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    Computing, 2014, 96 : 843 - 853
  • [46] Key-Evolving Hierarchical ID-Based Signcryption
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Hui
    COMPUTER JOURNAL, 2013, 56 (10): : 1228 - 1248
  • [47] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [48] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [49] A provably secure ID-based mediated signcryption scheme
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 647 - +
  • [50] ID-Based threshold signature and mediated signature schemes
    Yu, Yong
    Yang, Bo
    Sun, Ying
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +