Efficient ID-based deniable authentication protocols

被引:0
作者
Shi, Yijuan [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
来源
WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS | 2006年
关键词
deniable authentication; ID-based cryptography; bilinear pairing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identity-based interactive and non-interactive deniable authentication protocols are presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. The two protocols are more efficient than the existing deniable authentication protocols because they provide authentication without using the certificates. Furthermore, the protocols can withstand the impersonation attack and any third party cannot impersonate the intended receiver to identify the source of a given message. The security of the two protocols is analyzed heuristically under the assumption of the BDH problem.
引用
收藏
页码:321 / 324
页数:4
相关论文
共 10 条
  • [1] Aumann Y., 1998, INT C THEOR COMP SCI
  • [2] AUMANN Y, 1998, CRYPTO 98 SANT BARB, P299
  • [3] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
  • [4] BONEH D, 2001, LNCS, V2139
  • [5] Deniable authentication protocols
    Deng, X
    Lee, CH
    Zhu, H
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02): : 101 - 104
  • [6] Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
  • [7] Deniable authentication protocol based on Deffie-Hellman algorithm
    Fan, L
    Xu, CX
    Li, JH
    [J]. ELECTRONICS LETTERS, 2002, 38 (14) : 705 - 706
  • [8] Efficient identity based signature schemes based on pairings
    Hess, F
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [9] Shamir A., 1984, LECT NOTES COMPUTER, V196, P47, DOI [DOI 10.1007/3-540-39568-7, 10.1007/3-540-39568-7_5, 10.1007/978-1-4757-0602-4_5, DOI 10.1007/978-1-4757-0602-4_5]
  • [10] Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 449 - 454