Non-interactive identity based deniable authentication scheme

被引:0
作者
Kuo, Wen-Chung
Huang, Yu-Chih
机构
来源
PROCEEDING OF THE SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES | 2008年 / 7卷
关键词
pairing; ID-based; deniable authentication; key-Compromise Impersonation attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based deniable authentication protocol is a new kind of cryptographic authentication protocol, by which means that the authentication has no need for certificates and a specified receiver can identify the source of a given message, but not prove the identity of the sender to a third party. In recent years, many identity-based deniable authentication protocols have been proposed. However, most of these proposed schemes are interactive and less efficient. Therefore, in this paper, we would like to propose a new non-interactive identity-based deniable authentication protocol. Then, we proposed some lemmas to prove that their scheme can not only attain the desired deniable property but also prevent impersonate attacks.
引用
收藏
页码:353 / 356
页数:4
相关论文
共 18 条
[1]  
Aumann Y., 1998, INT C THEOR COMP SCI
[2]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339
[3]  
BONEH D, 2001, LNCS, V2139
[4]  
BUNEH D, 2001, LNCS, V2248, P514
[5]  
CAO T, P 19 INT C ADV INF N
[6]  
CHOU JS, ID BASED DENIABLE AU
[7]   Deniable authentication protocols [J].
Deng, X ;
Lee, CH ;
Zhu, H .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02) :101-104
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
[10]   Deniable authentication protocol based on Deffie-Hellman algorithm [J].
Fan, L ;
Xu, CX ;
Li, JH .
ELECTRONICS LETTERS, 2002, 38 (14) :705-706