A new ID-based deniable authentication protocol

被引:0
|
作者
Lu, Rongxing [1 ]
Cao, Zhenfu [1 ]
Wang, Shengbao [1 ]
Bao, Haiyong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
deniable authentication protocol; ID-based; non-interactive; RSA assumption; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be applied to some particular situations in electronic commerce. In this paper, we formally define the security model for the non-interactive ID-based deniable authentication protocol and present a new efficient ID-based deniable authentication protocol based on RSA assumption. What's more, we also use the techniques from provable security to analyze the security of our proposed protocol.
引用
收藏
页码:67 / 78
页数:12
相关论文
共 50 条
  • [31] Concatenated wireless roaming security association and authentication protocol using ID-based cryptography
    Lee, BG
    Kim, HG
    Sohn, SW
    Park, KH
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1507 - 1511
  • [32] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [33] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [34] A new deniable authentication protocol from bilinear pairings
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 954 - 961
  • [35] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [36] An Enhanced Deniable Authentication Protocol
    Li Gang
    Xin Xiangjun
    Li Wei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 336 - +
  • [37] An improved deniable authentication protocol
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    NETWORKS, 2006, 48 (04) : 179 - 181
  • [38] An Improved Deniable Authentication Protocol
    Lin, Chia-Chen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 240 - 243
  • [39] Quantum deniable authentication protocol
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    QUANTUM INFORMATION PROCESSING, 2014, 13 (07) : 1501 - 1510
  • [40] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +