A novel deniable authentication protocol using generalized ElGamal signature scheme

被引:36
|
作者
Lee, Wei-Bin
Wu, Chia-Chun
Tsaur, Woei-Jiunn
机构
[1] Da Yeh Univ, Dept Informat Management, Changhua 51505, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
关键词
information security; deniable authentication; digital signature; Internet;
D O I
10.1016/j.ins.2006.09.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable protocols inefficient. In addition, a security hole is generated in deniable protocols that use the non-interactive manner if a session secret is compromised. Thus, there is no secure and efficient deniable authentication protocol as of now. In this paper, a new protocol based on the non-interactive manner is proposed to efficiently and securely achieve deniable authentication. This protocol can furthermore replace the underlying signature scheme in order to retain a secure status even if the previously used signature method is broken. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1376 / 1381
页数:6
相关论文
共 50 条
  • [1] Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 449 - 454
  • [2] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
  • [3] A simple protocol for deniable authentication based on ElGamal cryptography
    Wang, YJ
    Li, JH
    Tie, L
    NETWORKS, 2005, 45 (04) : 193 - 194
  • [4] Efficient remote user authentication scheme based on generalized ElGamal signature scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 568 - 570
  • [5] A novel certificateless deniable authentication protocol
    Jin, Chunhua
    Xu, Chunxiang
    Li, Fagen
    Zhang, Xiaojun
    International Journal of Computers and Applications, 2015, 37 (3-4) : 181 - 192
  • [6] On Elgamal signature scheme
    Kuo, Wen-Chung
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [7] A novel quantum deniable authentication protocol without entanglement
    Wei-Min Shi
    Jian-Biao Zhang
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2015, 14 : 2183 - 2193
  • [8] A novel quantum deniable authentication protocol without entanglement
    Shi, Wei-Min
    Zhang, Jian-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 2183 - 2193
  • [9] Robust Deniable Authentication Protocol
    Eun-Jun Yoon
    Kee-Young Yoo
    Sang-Soo Yeo
    Changhoon Lee
    Wireless Personal Communications, 2010, 55 : 81 - 90
  • [10] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90