Improvement of an ID-based deniable authentication protocol

被引:0
|
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 50 条
  • [21] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [22] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [23] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [24] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity
    Jiang, Qi
    Li, Guang-Song
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
  • [25] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [26] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [27] Efficient ID-based authentication and key agreement protocols for the session initiation protocol
    Kilinc, Haci Hakan
    Allaberdiyev, Yolguly
    Yanik, Tugrul
    Erdem, Serdar Suer
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2015, 23 (02) : 560 - 579
  • [28] RETRACTED: ID-based Constant-Size Deniable Ring Authentication using a Secure Accumulator (Retracted Article)
    Hu, Chengyu
    Liu, Pengtao
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 354 - 357
  • [29] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [30] ID-Based Deniable Ring Signature with Constant-Size Signature
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2192 - +