Identity-based deniable authentication protocol from pairings

被引:0
作者
Liao, I-En [1 ]
Lee, Cheng-Chi [1 ,2 ]
Shiang, Wufeng
Hwang, Min-Shiang [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci, 250 Kuo Kuang Rd, Taichung 402, Taiwan
[2] Asia Univ, Dept Comp & Commun Engn, Taichung 413, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
来源
PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS | 2006年
关键词
cryptography; deniable authentication; pairings;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authors shall propose a secure, efficient, and non-interactive deniable authentication protocol in which a receiver cannot prove the source of a message to a third party. The proposed protocol is much more secure and efficient than existing protocols. It also satisfies all of the requirements of an ideal deniable authentication protocol.
引用
收藏
页码:112 / +
页数:2
相关论文
共 14 条
[1]  
[Anonymous], 2007, INT J NETWORK SECURI
[2]  
Aumann Y., 1998, INT C THEOR COMP SCI
[3]  
BONEH D, 2001, LNCS, V2139
[4]  
CAO T, 2006, INT J NETWORK SECURI, V3, P112
[5]  
Cao TJ, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P388
[6]  
Cheng X., 2006, INT J NETWORK SECURI, V2, P29
[7]   Deniable authentication protocols [J].
Deng, X ;
Lee, CH ;
Zhu, H .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2001, 148 (02) :101-104
[8]  
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
[9]   Deniable authentication protocol based on Deffie-Hellman algorithm [J].
Fan, L ;
Xu, CX ;
Li, JH .
ELECTRONICS LETTERS, 2002, 38 (14) :705-706
[10]   Efficient identity based signature schemes based on pairings [J].
Hess, F .
SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 :310-324