A novel deniable authentication protocol using generalized ElGamal signature scheme

被引:36
作者
Lee, Wei-Bin
Wu, Chia-Chun
Tsaur, Woei-Jiunn
机构
[1] Da Yeh Univ, Dept Informat Management, Changhua 51505, Taiwan
[2] Feng Chia Univ, Dept Comp Sci & Informat Engn, Taichung 40724, Taiwan
关键词
information security; deniable authentication; digital signature; Internet;
D O I
10.1016/j.ins.2006.09.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. Consequently, many interactive and non-interactive deniable authentication protocols have been proposed. However, the interactive manner makes deniable protocols inefficient. In addition, a security hole is generated in deniable protocols that use the non-interactive manner if a session secret is compromised. Thus, there is no secure and efficient deniable authentication protocol as of now. In this paper, a new protocol based on the non-interactive manner is proposed to efficiently and securely achieve deniable authentication. This protocol can furthermore replace the underlying signature scheme in order to retain a secure status even if the previously used signature method is broken. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1376 / 1381
页数:6
相关论文
共 50 条
[41]   A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME [J].
CHANG, CC ;
LIAO, WY .
COMPUTERS & SECURITY, 1994, 13 (02) :137-144
[42]   Secure authentication policy with evidential signature scheme for WLAN [J].
Ouyang, Yen-Chieh ;
Hsueh, Ching-Tsung ;
Chen, Hung-Wei .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (03) :259-270
[43]   New image authentication scheme based on digital signature [J].
Liu, BF ;
Zhang, WJ ;
Yu, SY .
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, :302-307
[44]   A New Electronic Voting Protocol Using A New Blind Signature Scheme [J].
Kharchineh, Behnam ;
Ettelaee, Mehdi .
SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, :190-194
[45]   A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature [J].
Samal, Kalpana ;
Sunanda, Shanta Kumari ;
Jena, Debasish ;
Patnaik, Srikanta .
INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2025, 17
[46]   A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication [J].
Abro, Adeel ;
Deng, Zhongliang ;
Memon, Kamran Ali .
FUTURE INTERNET, 2019, 11 (05)
[47]   Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol [J].
Oliver, S. Gladson ;
Purusothaman, T. .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02) :767-780
[48]   Integrating Multisignature Scheme into the Group Signature Protocol [J].
Hung Dao Tuan ;
Hieu Minh Nguyen ;
Cong Manh Tran ;
Hai Nam Nguyen ;
Adreevich, Moldovyan Nikolay .
ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 538 :294-301
[49]   A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection [J].
Zhao, Xiao ;
Cao, Suzhen ;
Wang, Zheng ;
Xing, Dandan ;
Zhou, Dawei .
PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, :570-575
[50]   A remote password authentication scheme based on the digital signature method [J].
Hwang, MS .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1999, 70 (04) :657-666