Efficient and Short Identity-Based Deniable Authenticated Encryption

被引:1
作者
Jin, Chunhua [1 ]
Zhao, Jianyang [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 233003, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2017年 / 10603卷
基金
中国国家自然科学基金;
关键词
Deniable authenticated encryption; Identity-based cryptography; Random oracle model; PROTOCOL; SCHEME; SIGNCRYPTION;
D O I
10.1007/978-3-319-68542-7_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication is an important security requirement for many applications that require user privacy protection, since the sender can deny that he/she has signed the message. Considering the importance of communication efficiency, in this paper, we explore the novel deniable authenticated encryption, which outperforms the existing ones in terms of communication costs and ciphertext size. Our protocol meets all the security requirement of message confidentiality and deniable message authentication. Our protocol is based on identity cryptography and can avoid the public key certificates based public key infrastructure (PKI). Our protocol is provably secure in the random oracle model.
引用
收藏
页码:244 / 255
页数:12
相关论文
共 25 条
  • [1] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [2] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [3] Chen Y., 2013, IACR CRYPTOLOGY EPRI, P783
  • [4] New Approaches for Deniable Authentication
    Di Raimondo, Mario
    Gennaro, Rosario
    [J]. JOURNAL OF CRYPTOLOGY, 2009, 22 (04) : 572 - 615
  • [5] Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
  • [6] Gambs Sebastien., 2014, ASIACCS 14, P501
  • [7] Design of fully deniable authentication service for e-mail applications
    Harn, Lein
    Ren, Jian
    [J]. IEEE COMMUNICATIONS LETTERS, 2008, 12 (03) : 219 - 221
  • [8] Fully Deniable Message Authentication Protocols Preserving Confidentiality
    Harn, Lein
    Lee, Chia-Yin
    Lin, Changlu
    Chang, Chin-Chen
    [J]. COMPUTER JOURNAL, 2011, 54 (10) : 1688 - 1699
  • [9] Hwang S., 2012, ADV INTELLIGENT SYST, V21, P41, DOI [10.1007/978-3-642-35473-15, DOI 10.1007/978-3-642-35473-15]
  • [10] Confidential deniable authentication using promised signcryption
    Hwang, Shin-Jia
    Sung, Yun-Hao
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1652 - 1659