Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol

被引:0
|
作者
Lim, Meng-Hui [1 ]
Lee, Sanggon [2 ]
Lee, Hoonjae [2 ]
机构
[1] Dongseo Univ, Grad Sch Design & IT, Dept Ubiquitous IT, Pusan 617716, South Korea
[2] Dongseo Univ, Dept Informat & Commun, Busan 617716, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniability is defined as a special privacy property which enables protocol principals to deny their participation after they have taken part in a particular protocol run. In 2005, Liao et a]. [121 proposed a variant of Cao et al.'s identity-based (ID-based) deniable authentication protocol [31 by incorporating an additional signature scheme into it to provide extra authentication. This enhancement is then claimed to be able to overcome the alleged weakness of Cao et al.'s protocol, secure and capable of achieving both authenticity and deniability properties simultaneously. However, we find out that the alleged "weakness" of Cao et al.'s protocol is actually required in preserving the deniability of their protocol. Furthermore, in this paper, we also demonstrate that Liao et al.'s protocol is not flawless due to its susceptibility to the KCI attack as well as its inability in satisfying several invaluable security attributes.
引用
收藏
页码:549 / +
页数:3
相关论文
共 50 条
  • [1] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [2] An Identity-based Restricted Deniable Authentication Protocol
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
  • [3] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [4] Identity-based deniable authentication protocol from pairings
    Liao, I-En
    Lee, Cheng-Chi
    Shiang, Wufeng
    Hwang, Min-Shiang
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
  • [5] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853
  • [6] Identity-based deniable authentication for ad hoc networks
    Fagen Li
    Pan Xiong
    Chunhua Jin
    Computing, 2014, 96 : 843 - 853
  • [7] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Li, Fagen
    Takagi, Tsuyoshi
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1391 - 1398
  • [8] Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
    Fagen Li
    Tsuyoshi Takagi
    Wireless Personal Communications, 2013, 69 : 1391 - 1398
  • [9] An Enhanced Deniable Authentication Protocol
    Li Gang
    Xin Xiangjun
    Li Wei
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 336 - +
  • [10] Identity-based authentication protocol for grid
    Li Hongwei
    Journal of Systems Engineering and Electronics, 2008, (04) : 860 - 865