Improvement of an ID-based deniable authentication protocol

被引:0
|
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 50 条
  • [1] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    JournalofElectronicScienceandTechnology, 2018, 16 (02) : 139 - 144
  • [3] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    INFORMATICA, 2007, 18 (01) : 67 - 78
  • [4] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [5] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [6] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
  • [7] Efficient ID-based deniable authentication protocols
    Shi, Yijuan
    Li, Jianhua
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 321 - 324
  • [8] ID-based Deniable Threshold Ring Authentication
    Jin, Chunhua
    Xu, Chunxiang
    Jiang, Linzhi
    Li, Fagen
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1779 - 1784
  • [9] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [10] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +