Improvement of an ID-based deniable authentication protocol

被引:0
|
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 50 条
  • [31] ID-based wireless authentication scheme with anonymity
    Zhu, Hui
    Li, Hui
    Su, Wan-Li
    Wang, Yu-Min
    Tongxin Xuebao/Journal on Communication, 2009, 30 (04): : 130 - 136
  • [32] New ID-Based AAA authentication system
    Cho, Young-Bok
    Lee, Sang-Ho
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 18 - +
  • [33] Security on Dynamic ID-based Authentication Schemes
    Zhai, Jingxuan
    Cao, Tianjie
    Chen, Xiuqing
    Huang, Shi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 387 - 396
  • [34] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [35] A New Dynamic ID-based RFID Mutual Authentication Protocol Providing Perfect Synchronization
    Lim, Jihwan
    Kim, Sangjin
    Oh, Heekuck
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (02): : 639 - 656
  • [36] Robust Deniable Authentication Protocol
    Eun-Jun Yoon
    Kee-Young Yoo
    Sang-Soo Yeo
    Changhoon Lee
    Wireless Personal Communications, 2010, 55 : 81 - 90
  • [37] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90
  • [38] Concatenated wireless roaming security association and authentication protocol using ID-based cryptography
    Lee, BG
    Kim, HG
    Sohn, SW
    Park, KH
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1507 - 1511
  • [39] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [40] Attacks and Improvement of "Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme"
    Cheikrouhou, Omar
    Boujelben, Manel
    Koubaa, Anis
    Abid, Mohamed
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 517 - +