Non-interactive deniable authentication protocol based on factoring

被引:27
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
cryptography; deniable authentication; factoring;
D O I
10.1016/j.csi.2004.09.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deniable authentication protocol is a new cryptographic authentication protocol that enables a specified receiver to identify the source of a given message, but not prove the identity of the sender to a third party. In recent years, many deniable authentication protocols have been proposed. However, most of these proposed schemes are interactive and less efficient. To our knowledge, only Shao has proposed an efficient non-interactive deniable authentication protocol based on generalized ElGamal signature scheme. Therefore, in this paper, we would like to propose another non-interactive deniable authentication protocol based on factoring. What's more, we also prove it is secure in the random oracle model. (c) 2004 Elsevier B.V All rights reserved.
引用
收藏
页码:401 / 405
页数:5
相关论文
共 50 条
  • [21] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
  • [22] Cryptanalysis of a non-interactive deniable ring signature scheme
    Huiwen Jia
    Chunming Tang
    International Journal of Information Security, 2021, 20 : 103 - 112
  • [23] Cryptanalysis of a non-interactive deniable ring signature scheme
    Jia, Huiwen
    Tang, Chunming
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 103 - 112
  • [24] Non-interactive cryptosystem for entity authentication
    Lee, HW
    Kim, JE
    Kim, TY
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 72 - 84
  • [25] Non-interactive deniable ring signature without random oracles
    Zeng, Shengke
    Li, Qinyi
    Qin, Zhiguang
    Lu, Qing
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1810 - 1819
  • [26] Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures
    Jia, Huiwen
    Tang, Chunming
    Zhang, Yanhua
    ENTROPY, 2021, 23 (08)
  • [27] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [28] Identity-based deniable authentication protocol
    Shi, Y
    Li, J
    ELECTRONICS LETTERS, 2005, 41 (05) : 241 - 242
  • [29] Robust Deniable Authentication Protocol
    Eun-Jun Yoon
    Kee-Young Yoo
    Sang-Soo Yeo
    Changhoon Lee
    Wireless Personal Communications, 2010, 55 : 81 - 90
  • [30] Robust Deniable Authentication Protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Yeo, Sang-Soo
    Lee, Changhoon
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 81 - 90