Robust Deniable Authentication Protocol

被引:0
作者
Eun-Jun Yoon
Kee-Young Yoo
Sang-Soo Yeo
Changhoon Lee
机构
[1] Kyungpook National University,School of Electrical Engineering and Computer Science
[2] Kyungpook National University,Department of Computer Engineering
[3] Mokwon University,Division of Computer Engineering
[4] Hanshin University,School of Computer Engineering
来源
Wireless Personal Communications | 2010年 / 55卷
关键词
Deniable authentication; Cryptography; Security; ElGamal cryptography; Electronic voting system;
D O I
暂无
中图分类号
学科分类号
摘要
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to identify the source of a received message, but also prevents a third party from identifying the source of the message. Recently, Shao et al. pointed out that Wang et al.’s deniable authentication protocol based on ElGamal cryptosystem is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.’s protocol to overcome the security flaw. However, this paper demonstrates that Shao et al.’s improved protocol is still susceptible to a malicious receiver’s impersonation attack. To mitigate this security breach, we propose a robust deniable authentication protocol based on ElGamal cryptography.
引用
收藏
页码:81 / 90
页数:9
相关论文
共 33 条
  • [1] Deng X.(2001)Deniable authentication protocols IEE Proceedings Computers and Digital Techniques 148 101-104
  • [2] Lee C. H.(2002)Deniable authentication protocol based on Diffie-Hellman algorithm Electronics letters 38 705-706
  • [3] Zhu H.(2004)An improvement of a deniable authentication protocol IEICE Transactions On Communications E87-B 3099-3101
  • [4] Fan L.(2004)Efficient deniable authentication protocol based on generalized ElGamal signature scheme Computer Standards & Interfaces 26 449-454
  • [5] Xu C. X.(2005)Non-interactive deniable authentication protocol based on factoring Computer Standards & Interfaces 27 401-405
  • [6] Li J. H.(2005)Improvement of Fan et al.’s deniable authentication protocol based on Diffie-Hellman algorithm Applied Mathematics and Computation 167 274-280
  • [7] Hsieh B. T.(2005)A new deniable authentication protocol from bilinear pairings Applied Mathematics and Computation 168 954-961
  • [8] Sun H. M.(2005)A simple protocol for deniable authentication based on ElGamal cryptography Networks 45 193-194
  • [9] Shao Z.(2006)An improved deniable authentication protocol Networks 48 179-181
  • [10] Lu R.(2007)A new ID-based deniable authentication protocol Informatica 18 67-78