Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol

被引:0
|
作者
Lim, Meng-Hui [1 ]
Lee, Sanggon [2 ]
Lee, Hoonjae [2 ]
机构
[1] Dongseo Univ, Grad Sch Design & IT, Dept Ubiquitous IT, Pusan 617716, South Korea
[2] Dongseo Univ, Dept Informat & Commun, Busan 617716, South Korea
来源
2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3 | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deniability is defined as a special privacy property which enables protocol principals to deny their participation after they have taken part in a particular protocol run. In 2005, Liao et a]. [121 proposed a variant of Cao et al.'s identity-based (ID-based) deniable authentication protocol [31 by incorporating an additional signature scheme into it to provide extra authentication. This enhancement is then claimed to be able to overcome the alleged weakness of Cao et al.'s protocol, secure and capable of achieving both authenticity and deniability properties simultaneously. However, we find out that the alleged "weakness" of Cao et al.'s protocol is actually required in preserving the deniability of their protocol. Furthermore, in this paper, we also demonstrate that Liao et al.'s protocol is not flawless due to its susceptibility to the KCI attack as well as its inability in satisfying several invaluable security attributes.
引用
收藏
页码:549 / +
页数:3
相关论文
共 50 条
  • [31] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90
  • [32] Quantum deniable authentication protocol
    Wei-Min Shi
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2014, 13 : 1501 - 1510
  • [33] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [34] Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC
    Kumar, Vivek
    Ray, Sangram
    Sadhukhan, Dipanwita
    Karmakar, Jayashree
    Dasgupta, Mou
    SECURITY AND PRIVACY, 2023, 6 (03):
  • [35] Practical Identity-Based Authentication Protocol for Ad-hoc Networks
    Feng, Boang
    Liu, Jianwei
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 365 - 368
  • [36] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [37] Efficient identity-based hierarchical access authentication protocol for mobile network
    Liu, He
    Liang, Mangui
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1509 - 1521
  • [38] LIAP: A local identity-based anonymous message authentication protocol in VANETs
    Wang, Shibin
    Yao, Nianmin
    COMPUTER COMMUNICATIONS, 2017, 112 : 154 - 164
  • [39] An efficient deniable authentication protocol
    Huang, HF
    Chang, CC
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 307 - 310
  • [40] An improved deniable authentication protocol
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    NETWORKS, 2006, 48 (04) : 179 - 181