skip to main content
article

An improvement on a deniable authentication protocol

Published:01 July 2004Publication History
Skip Abstract Section

Abstract

In 2002, Fan et al. proposed a deniable authentication protocol based on the Deffie-Hellman key agreement protocol. They guaranteed that the proposed protocol, which is deniable, can authenticate the source of the message and resist the person-in-the-middle(PIM) attack. However, the receiver is not authenticated in the proposed deniable authentication protocol, which will result in some security flaws. As a result, we propose an improvement to overcome these drawbacks in this paper.

References

  1. Dwork, C., Nair, M., and Sahai, A., "Concurrent zero-knowledge," Proceedings of the 30th Annual ACM Symposium on Theory of Computing, May 1998, Dallas, Texas, USA, pp. 409--418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aumann, Y. and Rabin, M., "Efficient deniable authentication of long messages," International Conference on Theoretical Computer Science in honour of Professor Manuel Blum's 60th Birthday, April 1998, Hong Kong, China.Google ScholarGoogle Scholar
  3. Deng, X., Lee, C-H., and Zhu, H., "Deniable authentication protocols," IEE Proceedings of Computers and Digital Techniques, Vol. 148, March 2001. pp. 101--104.Google ScholarGoogle ScholarCross RefCross Ref
  4. Fan, L., Xu, C.-X., and Li, J.-H., "Deniable authentication protocol based on Deffie-Hellman algorithm," IEE Electronics Letters, Vol. 38 No. 14, July 2002, pp. 705--706.Google ScholarGoogle ScholarCross RefCross Ref
  5. Diffie, W. and Hellman, M., "New directions in cryptography," IEEE Transactions on Information Theory, Vol. 22 No. 6, November 1976, pp. 644--654.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An improvement on a deniable authentication protocol
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 38, Issue 3
          July 2004
          96 pages
          ISSN:0163-5980
          DOI:10.1145/1035834
          Issue’s Table of Contents

          Copyright © 2004 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 July 2004

          Check for updates

          Qualifiers

          • article
        • Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader