A novel deniable authentication protocol using generalized ElGamal signature scheme

被引:36
作者
Lee, Wei-Bin
Wu, Chia-Chun
Tsaur, Woei-Jiunn
机构
[1] Da Yeh Univ, Dept Informat Management, Changhua 51505, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
关键词
information security; deniable authentication; digital signature; Internet;
D O I
10.1016/j.ins.2006.09.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable protocols inefficient. In addition, a security hole is generated in deniable protocols that use the non-interactive manner if a session secret is compromised. Thus, there is no secure and efficient deniable authentication protocol as of now. In this paper, a new protocol based on the non-interactive manner is proposed to efficiently and securely achieve deniable authentication. This protocol can furthermore replace the underlying signature scheme in order to retain a secure status even if the previously used signature method is broken. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1376 / 1381
页数:6
相关论文
共 50 条
[21]   Improvement of an ID-based deniable authentication protocol [J].
Lin T.-C. .
Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16) :139-144
[22]   Non-interactive identity based deniable authentication scheme [J].
Kuo, Wen-Chung ;
Huang, Yu-Chih .
PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2008, 7 :353-356
[23]   Non-interactive deniable authentication protocol based on factoring [J].
Lu, RX ;
Cao, ZF .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) :401-405
[24]   A Secure Identity-based Deniable Authentication Protocol for MANETs [J].
Gupta, Daya Sagar ;
Islam, S. K. Hafizul ;
Obaidat, Mohammad S. .
PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, :91-95
[25]   Deniable Authentication Protocol Resisting Man-in-the-Middle Attack [J].
Han, Song ;
Liu, Wanquan ;
Chang, Elizabeth .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 :161-164
[26]   Identity-based deniable authentication protocol from pairings [J].
Liao, I-En ;
Lee, Cheng-Chi ;
Shiang, Wufeng ;
Hwang, Min-Shiang .
PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, :112-+
[27]   Certificateless aggregate deniable authentication protocol for ad hoc networks [J].
Jin, Chunhua ;
Zhao, Jianyang .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (02) :168-187
[28]   An Efficient Deniable Authentication Protocol from Pairings to Protect Users' Privacy [J].
Hsu, Chien-Lung ;
Chuang, Yu-Hao ;
Hung, Ming-Tsung .
CHIANG MAI JOURNAL OF SCIENCE, 2014, 41 (5.2) :1384-1391
[29]   On the security of the ElGamal-type signature scheme with small parameters [J].
Kuwakado, H ;
Tanaka, H .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) :93-97
[30]   An electronic voting protocol with deniable authentication for mobile ad hoc networks [J].
Li, Chun-Ta ;
Hwang, Min-Shiang ;
Liu, Chi-Yu .
COMPUTER COMMUNICATIONS, 2008, 31 (10) :2534-2540