Improvement of an ID-based deniable authentication protocol

被引:0
|
作者
Lin T.-C. [1 ]
机构
[1] Department of Applied Mathematics, Feng Chia University, Taichung
来源
Lin, Tzu-Chun (lintc@fcu.edu.tw) | 2018年 / Univ. of Electronic Science and Technology of China卷 / 16期
关键词
Bilinear pairing; Deniable authentication; Diffie-Hellman; Elliptic curves;
D O I
10.11989/JEST.1674-862X.7100910
中图分类号
学科分类号
摘要
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful for providing secure negotiation over the Internet. The ID-based deniable authentication protocol based on elliptic Diffie-Hellman key agreement protocol cannot defend the sender spoofing attack and message modification attack. In this paper, we present an improved protocol based on double elliptic Diffie- Hellman scheme. According to the comparison result, the proposed protocol performs better. © 2018, Journal of Electronic Science and Technology.
引用
收藏
页码:139 / 144
页数:5
相关论文
共 50 条
  • [41] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [42] An Enhanced Deniable Authentication Protocol
    Li Gang
    Xin Xiangjun
    Li Wei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 336 - +
  • [43] An improved deniable authentication protocol
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    NETWORKS, 2006, 48 (04) : 179 - 181
  • [44] An Improved Deniable Authentication Protocol
    Lin, Chia-Chen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 240 - 243
  • [45] Quantum deniable authentication protocol
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    QUANTUM INFORMATION PROCESSING, 2014, 13 (07) : 1501 - 1510
  • [46] Secure deniable authentication protocol based on ElGamal cryptography
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
  • [47] A simple protocol for deniable authentication based on ElGamal cryptography
    Wang, YJ
    Li, JH
    Tie, L
    NETWORKS, 2005, 45 (04) : 193 - 194
  • [48] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
  • [49] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [50] ID-based key agreement and authentication scheme in WLAN
    Liu, Han
    Gu, Da-Wu
    Shi, Qing-Zu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330