A new ID-based deniable authentication protocol

被引:0
|
作者
Lu, Rongxing [1 ]
Cao, Zhenfu [1 ]
Wang, Shengbao [1 ]
Bao, Haiyong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
deniable authentication protocol; ID-based; non-interactive; RSA assumption; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be applied to some particular situations in electronic commerce. In this paper, we formally define the security model for the non-interactive ID-based deniable authentication protocol and present a new efficient ID-based deniable authentication protocol based on RSA assumption. What's more, we also use the techniques from provable security to analyze the security of our proposed protocol.
引用
收藏
页码:67 / 78
页数:12
相关论文
共 50 条
  • [21] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [22] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [23] RETRACTED: ID-based Constant-Size Deniable Ring Authentication using a Secure Accumulator (Retracted Article)
    Hu, Chengyu
    Liu, Pengtao
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 354 - 357
  • [24] ID-Based Deniable Ring Signature with Constant-Size Signature
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2192 - +
  • [25] ID-based wireless authentication scheme with anonymity
    Zhu, Hui
    Li, Hui
    Su, Wan-Li
    Wang, Yu-Min
    Tongxin Xuebao/Journal on Communication, 2009, 30 (04): : 130 - 136
  • [26] Security on Dynamic ID-based Authentication Schemes
    Zhai, Jingxuan
    Cao, Tianjie
    Chen, Xiuqing
    Huang, Shi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 387 - 396
  • [27] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [28] A new ID-based group key agreement protocol for the network
    Xia, Meichen
    He, Mingxing
    Xie, Liyun
    Journal of Computational Information Systems, 2009, 5 (06): : 1855 - 1860
  • [29] Robust Deniable Authentication Protocol
    Eun-Jun Yoon
    Kee-Young Yoo
    Sang-Soo Yeo
    Changhoon Lee
    Wireless Personal Communications, 2010, 55 : 81 - 90
  • [30] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90