Full and partial deniability for authentication schemes

被引:1
作者
Liu, Jiqiang [1 ]
Chen, Xun [1 ]
Han, Zhen [1 ]
机构
[1] Beijing Jiaotong Univ, Dept Comp & Informat Technol, Beijing 100044, Peoples R China
来源
FRONTIERS OF COMPUTER SCIENCE IN CHINA | 2010年 / 4卷 / 04期
关键词
authentication; deniability; bilinear maps; PROTOCOL;
D O I
10.1007/s11704-010-0365-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication is a type of authentication protocol with the special property of deniability. However, there have been several different definitions of deniability in authentication protocols. In this paper, we clarify this issue by defining two types of deniable authentication: In the first type of deniable authentication, the receiver of the authenticated message cannot prove to a third party that the sender has authenticated any message to him. We call this type of deniability full deniability. In the second type of deniable authentication, whilst the receiver can prove to a third party that the sender has authenticated some message to him, but he cannot prove to a third party that the sender has authenticated any particular message to the receiver. We call this type of deniability partial deniability. Note that partial deniability is not implied by full deniability, and that it has applications different from those of full deniability. Consequently, we present two identity-based authentication schemes and prove that one is fully deniable while the other is partially deniable. These two schemes can be useful in different scenarios.
引用
收藏
页码:516 / 521
页数:6
相关论文
共 13 条
  • [1] [Anonymous], INT INT C THEOR COMP
  • [2] [Anonymous], P 13 ACM C COMP COMM
  • [3] [Anonymous], 2001, FDN CRYPTOGRAPHY
  • [4] [Anonymous], ID BASED SIGNATURES
  • [5] [Anonymous], P 14 ACM C COMP COMM
  • [6] Aumann Y, 1998, LECT NOTES COMPUT SC, V1462, P299, DOI 10.1007/BFb0055736
  • [7] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [8] Nonmalleable cryptography
    Dolev, D
    Dwork, C
    Naor, M
    [J]. SIAM JOURNAL ON COMPUTING, 2000, 30 (02) : 391 - 437
  • [9] Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
  • [10] A simple deniable authentication protocol based on the Diffie-Hellman algorithm
    Lu, Rongxing
    Lin, Xiaodong
    Cao, Zhenfu
    Qin, Liuquan
    Liang, Xiaohui
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2008, 85 (09) : 1315 - 1323