Abstract
In 2002, Fan et al. proposed a deniable authentication protocol based on the Deffie-Hellman key agreement protocol. They guaranteed that the proposed protocol, which is deniable, can authenticate the source of the message and resist the person-in-the-middle(PIM) attack. However, the receiver is not authenticated in the proposed deniable authentication protocol, which will result in some security flaws. As a result, we propose an improvement to overcome these drawbacks in this paper.
- Dwork, C., Nair, M., and Sahai, A., "Concurrent zero-knowledge," Proceedings of the 30th Annual ACM Symposium on Theory of Computing, May 1998, Dallas, Texas, USA, pp. 409--418. Google ScholarDigital Library
- Aumann, Y. and Rabin, M., "Efficient deniable authentication of long messages," International Conference on Theoretical Computer Science in honour of Professor Manuel Blum's 60th Birthday, April 1998, Hong Kong, China.Google Scholar
- Deng, X., Lee, C-H., and Zhu, H., "Deniable authentication protocols," IEE Proceedings of Computers and Digital Techniques, Vol. 148, March 2001. pp. 101--104.Google ScholarCross Ref
- Fan, L., Xu, C.-X., and Li, J.-H., "Deniable authentication protocol based on Deffie-Hellman algorithm," IEE Electronics Letters, Vol. 38 No. 14, July 2002, pp. 705--706.Google ScholarCross Ref
- Diffie, W. and Hellman, M., "New directions in cryptography," IEEE Transactions on Information Theory, Vol. 22 No. 6, November 1976, pp. 644--654.Google ScholarDigital Library
Index Terms
- An improvement on a deniable authentication protocol
Recommendations
ID-Based Non-interactive Deniable Authentication Protocol
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver’s private and some other public values. ...
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
A deniable authentication protocol enables a receiver to identify the source of a given message, but the receiver cannot prove the source of the message to a third party. Recently, Yoon et al. (Wirel Pers Commun 55:81---90, 2010) proposed a robust ...
A new deniable authentication protocol from bilinear pairings
Deniable authentication protocol is a new technique of modern cryptography, and several such schemes have been proposed. However, to our knowledge, most of these schemes are interactive and less efficient, and only Shao proposed an efficient non-...
Comments