A new ID-based deniable authentication protocol

被引:0
|
作者
Lu, Rongxing [1 ]
Cao, Zhenfu [1 ]
Wang, Shengbao [1 ]
Bao, Haiyong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
关键词
deniable authentication protocol; ID-based; non-interactive; RSA assumption; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be applied to some particular situations in electronic commerce. In this paper, we formally define the security model for the non-interactive ID-based deniable authentication protocol and present a new efficient ID-based deniable authentication protocol based on RSA assumption. What's more, we also use the techniques from provable security to analyze the security of our proposed protocol.
引用
收藏
页码:67 / 78
页数:12
相关论文
共 50 条
  • [41] A simple protocol for deniable authentication based on ElGamal cryptography
    Wang, YJ
    Li, JH
    Tie, L
    NETWORKS, 2005, 45 (04) : 193 - 194
  • [42] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [43] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [44] A Dynamic ID-based authentication scheme with smart token
    Hamza, Nermin
    Hassan, Bahaa El-Din M.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 294 - +
  • [45] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
  • [46] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [47] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [48] An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    COMPUTER JOURNAL, 2010, 53 (07): : 1062 - 1070
  • [49] ID-BASED AUTHENTICATION SYSTEM FOR COMPUTER VIRUS DETECTION
    OKAMOTO, E
    MASUMOTO, H
    ELECTRONICS LETTERS, 1990, 26 (15) : 1169 - 1170
  • [50] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478